SAINT® v7.3.2 Released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.
New vulnerability checks in version 7.3.2:
- Internet Explorer Cumulative Security Update. (MS10-018) (CVE2010-0267CVE2010-0488)
- MIT Kerberos ’gss_accept_sec_context()’ Denial Of Service Vulnerability. (CVE2010-0628)
- PHP Multiple Vulnerabilities fixed in 5.2.13.(CVE2010-1128CVE2010-1129CVE2010-1130)
- Apple Safari Style Tag Remote Memory Corruption. (CVE2010-1029)
- Apple Safari ’background’ attribute Remote Denial Of Service Vulnerability. (BID38447)
- Microsoft SQL Server common "sa" passwords
- Asterisk CIDR Notation in Access Rule Remote Security Bypass. (BID38424)
- Trend Micro OfficeScan URL Filtering Engine Buffer Overflow Vulnerability. (CVE2010-0564)
- Ingres Database iidbms Buffer Overflow Vulnerability. (BID38001)
- vBulletin Multiple Cross Site Scripting Vulnerabilities. (BID38339)
New exploits in this version:
- SAP GUI SAPBExCommonResources ActiveX Command Execution exploit
- Liquid XML Studio ActiveX exploit
Post scriptum
Compliance Mandates
|
Related Articles
Penetration testing & Ethical Hacking |
|
Saint |
|
Vulnerability Management |
|