cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2008-3865,https://securityvulnerability.io/vulnerability/CVE-2008-3865,,"Multiple heap-based buffer overflows in the ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allow remote attackers to execute arbitrary code via a packet with a small value in an unspecified size field.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.3273800015449524,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0 CVE-2008-3866,https://securityvulnerability.io/vulnerability/CVE-2008-3866,,"The Trend Micro Personal Firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, relies on client-side password protection implemented in the configuration GUI, which allows local users to bypass intended access restrictions and change firewall settings by using a modified client to send crafted packets.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.0004199999966658652,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0 CVE-2008-3864,https://securityvulnerability.io/vulnerability/CVE-2008-3864,,"The ApiThread function in the firewall service (aka TmPfw.exe) in Trend Micro Network Security Component (NSC) modules, as used in Trend Micro OfficeScan 8.0 SP1 Patch 1 and Internet Security 2007 and 2008 17.0.1224, allows remote attackers to cause a denial of service (service crash) via a packet with a large value in an unspecified size field.",Trend Micro,"Internet Security 2008,Internet Security 2007,Officescan",,,0.0690699964761734,false,false,false,false,,false,false,2009-01-21T20:00:00.000Z,0