cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-3865,https://securityvulnerability.io/vulnerability/CVE-2008-3865,,"Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.3273800015449524,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0 CVE-2008-3866,https://securityvulnerability.io/vulnerability/CVE-2008-3866,,"The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.0004199999966658652,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0 CVE-2008-3864,https://securityvulnerability.io/vulnerability/CVE-2008-3864,,"The ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allows remote attackers to cause a denial of service (service crash) via a packet with a large value in an unspecified size field.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.0690699964761734,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0 CVE-2007-4277,https://securityvulnerability.io/vulnerability/CVE-2007-4277,,"The Trend Micro AntiVirus scan engine before 8.550-1001, as used in Trend Micro PC-Cillin Internet Security 2007, and Tmxpflt.sys 8.320.1004 and 8.500.0.1002, has weak permissions (Everyone:Write) for the \\.\Tmfilter device, which allows local users to send arbitrary content to the device via the IOCTL functionality. NOTE: this can be leveraged for privilege escalation by exploiting a buffer overflow in the handler for IOCTL 0xa0284403.",Trend Micro,"Pc-cillin Internet Security 2007,Scan Engine",,,0.0004199999966658652,false,false,false,false,,false,false,2007-10-30T22:00:00.000Z,0 CVE-2007-3873,https://securityvulnerability.io/vulnerability/CVE-2007-3873,,"Stack-based buffer overflow in vstlib32.dll 1.2.0.1012 in the SSAPI Engine 5.0.0.1066 through 5.2.0.1012 in Trend Micro AntiSpyware 3.5 and PC-Cillin Internet Security 2007 15.0 through 15.3, when the Venus Spy Trap (VST) feature is enabled, allows local users to cause a denial of service (service crash) or execute arbitrary code via a file with a long pathname, which triggers the overflow during a ReadDirectoryChangesW callback notification.",Trend Micro,"Pc-cillin Internet Security 2007,Antispyware",,,0.0004199999966658652,false,false,false,false,,false,false,2007-08-22T23:17:00.000Z,0