Saint 6.3.2 released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.
New vulnerability checks in version 6.3.2:
- WFTPD APPE buffer overflow vulnerability
- WarFTPd denial of service vulnerability
- Simplog SQL injection vulnerability
- Lotus Notes Domino vulnerabilities
- Xoops related cross-site scripting vulnerability
- PowerDNS vulnerabilities
- Broadcom wireless driver vulnerability
- MailEnable IMAP vulnerabilities
- Brightstor ARCserve backup tape buffer overflow vulnerability
- Novell Client Print Provider buffer overflow vulnerability
- PHPKit SQL injection vulnerabilities
- Verity Ultraseek vulnerabilities
- WinZip ActiveX vulnerability
- GNU Radius accounting format string vulnerability
- ProFTPd vulnerability
- Adobe Acrobat and Reader for ActiveX Control memory overflow
- MacOSX Security Update 2006-007
- ImageMagick vulnerabilities
- GNU tar vulnerability
- GnuPG vulnerability
- Horde Kronolith vulnerability
- DNS Bind vulnerability
- 3Com TFTP Server Remote Buffer Overflow
- vBulletin cross-site scripting vulnerability
- Sun Java System Web Proxy Server HTTP Request Smuggling vulnerability
- phpMyAdmin vulnerabilities
- NetGear MA521 wireless driver vulnerability
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|