cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2007-6386,https://securityvulnerability.io/vulnerability/CVE-2007-6386,,"Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.",Trend Micro,"Trend Micro Antivirus Plus Antispyware,Trend Micro Internet Security Pro,Trend Micro Internet Security Virus Bust",,,0.0049600000493228436,false,false,false,false,,false,false,2007-12-15T02:00:00.000Z,0 CVE-2007-3873,https://securityvulnerability.io/vulnerability/CVE-2007-3873,,"Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification.",Trend Micro,"Pc-cillin Internet Security 2007,Antispyware",,,0.0004199999966658652,false,false,false,false,,false,false,2007-08-22T23:17:00.000Z,0 CVE-2007-0856,https://securityvulnerability.io/vulnerability/CVE-2007-0856,,"TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.",Trend Micro,"Trend Micro Antispyware,Damage Cleanup Services,Tmcomm.sys,Trend Micro Antirootkit Common Module,Pc-cillin Internet Security,Client-server-messaging Security,VSAPini.sys,Trend Micro Antivirus",,,0.0004199999966658652,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0