Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2010-3268

EPSS 8.75% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2010-3268

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The GetStringAMSHandler function in prgxhndl.dll in hndlrsvc.exe in the Intel Alert Handler service (aka Symantec Intel Handler service) in Intel Alert Management System (AMS), as used in Symantec Antivirus Corporate Edition 10.1.4.4010 on Windows 2000 SP4 and Symantec Endpoint Protection before 11.x, does not properly validate the CommandLine field of an AMS request, which allows remote attackers to cause a denial of service (application crash) via a crafted request.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Symantec Antivirus Alert Management System拒绝服务漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Symantec AntiVirus Corporate Edition是非常流行的企业级杀毒解决方案。 使用在基于Windows 2000 SP4以及Symantec Endpoint Protection before 11.x版本的Symantec Antivirus Corporate Edition 10.1.4.4010版本中的Intel Alert Management System(AMS)中的Intel Alert Handler服务(又名Symantec Intel Handler服务
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2010-3268

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2010-3268

登录查看更多情报信息。

Same Patch Batch · n/a · 2010-12-22 · 45 CVEs total

CVE-2010-4584Opera X.509证书加密问题漏洞
CVE-2010-4587Opera设计错误漏洞
CVE-2010-4586Opera默认配置错误漏洞
CVE-2010-0114Symantec Endpoint Protection fw_charts.php文件任意代码执行漏洞
CVE-2010-4574Google Chrome Pickle::Pickle函数拒绝服务漏洞
CVE-2010-4575Google Chrome ThemeInstalledInfoBarDelegate::Observe函数拒绝服务漏洞
CVE-2010-4576Google Chrome dispatcher.cc文件空指针引用漏洞
CVE-2010-4577Google Chrome CSS越界读取漏洞
CVE-2010-4578Google Chrome拒绝服务攻击漏洞
CVE-2010-4116HP StorageWorks Storage Mirroring远程代码执行漏洞
CVE-2010-4585Opera自动升级功能拒绝服务漏洞
CVE-2010-4583Opera Turbo设计错误漏洞
CVE-2010-4582Opera权限许可和访问控制漏洞
CVE-2010-4581Opera opera_browser未明漏洞
CVE-2010-4580Opera信息泄漏漏洞
CVE-2010-4579Opera设计错误漏洞
CVE-2010-4333Pangramsoft Pointter PHP Content Management System授权问题漏洞
CVE-2010-4332Pangramsoft Pointter PHP Content Management System管理特权绕过漏洞
CVE-2010-4275Dmasoftlab Radius Manager New User Group Script任意代码执行漏洞
CVE-2010-2590SAP Crystal Reports Print ActiveX Control缓冲区溢出漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2010-3268

No comments yet


Leave a comment