cpe:/a:symantec:antivirus:10.0 cpe:/a:symantec:antivirus:10.0.1 cpe:/a:symantec:antivirus:10.0.1.1 cpe:/a:symantec:antivirus:10.0.2 cpe:/a:symantec:antivirus:10.0.2.1 cpe:/a:symantec:antivirus:10.0.2.2 cpe:/a:symantec:antivirus:10.0.3 cpe:/a:symantec:antivirus:10.0.4 cpe:/a:symantec:antivirus:10.0.5 cpe:/a:symantec:antivirus:10.0.6 cpe:/a:symantec:antivirus:10.0.7 cpe:/a:symantec:antivirus:10.0.8 cpe:/a:symantec:antivirus:10.0.9 cpe:/a:symantec:antivirus:10.1 cpe:/a:symantec:antivirus:10.1::corporate cpe:/a:symantec:antivirus:10.1:mp1:corporate cpe:/a:symantec:antivirus:10.1:mr4:corporate cpe:/a:symantec:antivirus:10.1:mr5:corporate cpe:/a:symantec:antivirus:10.1:mr7:corporate cpe:/a:symantec:antivirus:10.1.0.1::corporate cpe:/a:symantec:antivirus:10.1.4::corporate cpe:/a:symantec:antivirus:10.1.4.1::corporate cpe:/a:symantec:antivirus:10.1.5::corporate cpe:/a:symantec:antivirus:10.1.5.1::corporate cpe:/a:symantec:antivirus:10.1.6::corporate cpe:/a:symantec:antivirus:10.1.6.1::corporate cpe:/a:symantec:antivirus:10.1.7::corporate cpe:/a:symantec:antivirus:10.2::corporate cpe:/a:symantec:antivirus:10.2:mr2:corporate cpe:/a:symantec:antivirus:10.2:mr3:corporate cpe:/a:symantec:client_security:3.0 cpe:/a:symantec:client_security:3.0:mr1 cpe:/a:symantec:client_security:3.0:mr2 cpe:/a:symantec:client_security:3.0.0.359 cpe:/a:symantec:client_security:3.0.1.1000 cpe:/a:symantec:client_security:3.0.1.1007 cpe:/a:symantec:client_security:3.0.1.1008 cpe:/a:symantec:client_security:3.0.2 cpe:/a:symantec:client_security:3.0.2.2000 cpe:/a:symantec:client_security:3.0.2.2001 cpe:/a:symantec:client_security:3.0.2.2010 cpe:/a:symantec:client_security:3.0.2.2011 cpe:/a:symantec:client_security:3.0.2.2020 cpe:/a:symantec:client_security:3.0.2.2021 cpe:/a:symantec:client_security:3.1 cpe:/a:symantec:client_security:3.1:mr4 cpe:/a:symantec:client_security:3.1:mr5 cpe:/a:symantec:client_security:3.1:mr7 cpe:/a:symantec:client_security:3.1.0.396 cpe:/a:symantec:client_security:3.1.0.401 cpe:/a:symantec:client_security:3.1.394 cpe:/a:symantec:client_security:3.1.400 cpe:/a:symantec:client_security:3.1.401 cpe:/a:symantec:endpoint_protection:11 CVE-2010-0108 2010-02-19T12:30:00.690-05:00 2017-08-16T21:31:52.447-04:00 10.0 NETWORK LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2010-02-22T09:00:00.000-05:00 BUGTRAQ 20100219 [DSECRG-09-039] Symantec Antivirus 10.0 ActiveX - buffer Overflow. BID 38222 SECUNIA 38651 VUPEN ADV-2010-0412 IAVM IAVM:2010-A-0036 MISC http://dsecrg.com/pages/vul/show.php?id=139 CONFIRM http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02 CONFIRM http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100217_02 XF scp-cliproxy-activex-bo(56355) Buffer overflow in the cliproxy.objects.1 ActiveX control in the Symantec Client Proxy (CLIproxy.dll) in Symantec AntiVirus 10.0.x, 10.1.x before MR9, and 10.2.x before MR4; and Symantec Client Security 3.0.x and 3.1.x before MR9 allows remote attackers to execute arbitrary code via a long argument to the SetRemoteComputerName function.