cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2007-0851,https://securityvulnerability.io/vulnerability/CVE-2007-0851,,"Buffer overflow in the Trend Micro Scan Engine 8.000 and 8.300 before virus pattern file 4.245.00, as used in other products such as Cyber Clean Center (CCC) Cleaner, allows remote attackers to execute arbitrary code via a malformed UPX compressed executable.",Trend Micro,"Interscan Emanager,Scanmail,Pc Cillin - Internet Security 2006,Interscan Viruswall,Officescan,Interscan Viruswall For Windows Nt,Portalprotect,Interscan Web Security Suite,Serverprotect,Control Manager,Viruswall,Webprotect,Interscan Webmanager,Pc-cillin Internet Security,Interscan Messaging Security Suite,Web Security Suite,Client-server-messaging Suite Smb,Interscan Viruswall Scan Engine,Client-server Suite Smb,Pc-cillin,Scanning Engine,Scanmail Emanager,Interscan Webprotect",,,0.8936799764633179,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0 CVE-2004-1859,https://securityvulnerability.io/vulnerability/CVE-2004-1859,,Directory traversal vulnerability in Trend Micro Interscan Web Viruswall in InterScan VirusWall 3.5x allows remote attackers to read arbitrary files via a .. (dot dot) in the URL.,Trend Micro,Interscan Viruswall For Windows Nt,,,0.5731800198554993,false,false,false,false,,false,false,2004-03-24T05:00:00.000Z,0 CVE-2002-1839,https://securityvulnerability.io/vulnerability/CVE-2002-1839,,"Trend Micro InterScan VirusWall for Windows NT 3.52 does not record the sender's IP address in the headers for a mail message when it is passed from VirusWall to the MTA, which allows remote attackers to hide the origin of the message.",Trend Micro,Interscan Viruswall For Windows Nt,,,0.005179999861866236,false,false,false,false,,false,false,2002-12-31T05:00:00.000Z,0