cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-2437,https://securityvulnerability.io/vulnerability/CVE-2008-2437,,"Stack-based buffer overflow in cgiRecvFile.exe in Trend Micro OfficeScan 7.3 patch 4 build 1362 and other builds, OfficeScan 8.0 and 8.0 SP1, and Client Server Messaging Security 3.6 allows remote attackers to execute arbitrary code via an HTTP request containing a long ComputerName parameter.",Trend Micro,"Client-server-messaging Security,Officescan",,,0.5844799876213074,false,false,false,false,,false,false,2008-09-16T22:00:00.000Z,0 CVE-2008-2433,https://securityvulnerability.io/vulnerability/CVE-2008-2433,,"The web management console in Trend Micro OfficeScan 7.0 through 8.0, Worry-Free Business Security 5.0, and Client/Server/Messaging Suite 3.5 and 3.6 creates a random session token based only on the login time, which makes it easier for remote attackers to hijack sessions via brute-force attacks. NOTE: this can be leveraged for code execution through an unspecified ""manipulation of the configuration.""",Trend Micro,"Worry Free Business Security,Client Server Messaging Suite,Officescan",9.8,CRITICAL,0.29102998971939087,false,false,false,false,,false,false,2008-08-27T20:00:00.000Z,0 CVE-2007-0325,https://securityvulnerability.io/vulnerability/CVE-2007-0325,,"Multiple buffer overflows in the Trend Micro OfficeScan Web-Deployment SetupINICtrl ActiveX control in OfficeScanSetupINI.dll, as used in OfficeScan 7.0 before Build 1344, OfficeScan 7.3 before Build 1241, and Client / Server / Messaging Security 3.0 before Build 1197, allow remote attackers to execute arbitrary code via a crafted HTML document.",Trend Micro,"Officescan Corporate Edition,Client-server-messaging Security",,,0.8903999924659729,false,false,false,false,,false,false,2007-02-20T17:00:00.000Z,0 CVE-2007-0851,https://securityvulnerability.io/vulnerability/CVE-2007-0851,,"Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.",Trend Micro,"Interscan Emanager,Scanmail,Pc Cillin - Internet Security 2006,Interscan Viruswall,Officescan,Interscan Viruswall For Windows Nt,Portalprotect,Interscan Web Security Suite,Serverprotect,Control Manager,Viruswall,Webprotect,Interscan Webmanager,Pc-cillin Internet Security,Interscan Messaging Security Suite,Web Security Suite,Client-server-messaging Suite Smb,Interscan Viruswall Scan Engine,Client-server Suite Smb,Pc-cillin,Scanning Engine,Scanmail Emanager,Interscan Webprotect",,,0.8936799764633179,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0 CVE-2007-0856,https://securityvulnerability.io/vulnerability/CVE-2007-0856,,"TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.",Trend Micro,"Trend Micro Antispyware,Damage Cleanup Services,Tmcomm.sys,Trend Micro Antirootkit Common Module,Pc-cillin Internet Security,Client-server-messaging Security,VSAPini.sys,Trend Micro Antivirus",,,0.0004199999966658652,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0 CVE-2005-0533,https://securityvulnerability.io/vulnerability/CVE-2005-0533,,"Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.",Trend Micro,"Interscan Emanager,Scanmail,Serverprotect,Interscan Viruswall,Officescan,Interscan Web Security Suite,Interscan Webmanager,Interscan Messaging Security Suite,Control Manager,Client-server-messaging Suite Smb,Client-server Suite Smb,Pc-cillin,Portalprotect,Scanmail Emanager,Interscan Webprotect",,,0.21536000072956085,false,false,false,false,,false,false,2005-05-02T04:00:00.000Z,0