cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2005-3360,https://securityvulnerability.io/vulnerability/CVE-2005-3360,,"The installation of Trend Micro PC-Cillin Internet Security 2005 12.00 build 1244, and probably previous versions, uses insecure default ACLs, which allows local users to cause a denial of service (disabled service) and gain system privileges by modifying or moving critical program files.",Trend Micro,Pc-cillin 2005,,,0.0004199999966658652,false,false,false,false,,false,false,2005-12-14T20:00:00.000Z,0 CVE-2005-3379,https://securityvulnerability.io/vulnerability/CVE-2005-3379,,"Multiple interpretation error in Trend Micro (1) PC-Cillin 2005 12.0.1244 with the 7.510.1002 engine and (2) OfficeScan 7.0 with the 7.510.1002 engine allows remote attackers to bypass virus scanning via a file such as BAT, HTML, and EML with an ""MZ"" magic byte sequence which is normally associated with EXE, which causes the file to be treated as a safe type that could still be executed as a dangerous file type by applications on the end system, as demonstrated by a ""triple headed"" program that contains EXE, EML, and HTML content, aka the ""magic byte bug.""",Trend Micro,"Pc-cillin 2005,Officescan",,,0.009929999709129333,false,false,false,false,,false,false,2005-10-30T14:34:00.000Z,0