cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2007-6386,https://securityvulnerability.io/vulnerability/CVE-2007-6386,,"Stack-based buffer overflow in PccScan.dll before build 1451 in Trend Micro AntiVirus plus AntiSpyware 2008, Internet Security 2008, and Internet Security Pro 2008 allows user-assisted remote attackers to cause a denial of service (SfCtlCom.exe crash), and allows local users to gain privileges, via a malformed .zip archive with a long name, as demonstrated by a .zip file created via format string specifiers in a crafted .uue file.",Trend Micro,"Trend Micro Antivirus Plus Antispyware,Trend Micro Internet Security Pro,Trend Micro Internet Security Virus Bust",,,0.0049600000493228436,false,false,false,false,,false,false,2007-12-15T02:00:00.000Z,0 CVE-2007-0856,https://securityvulnerability.io/vulnerability/CVE-2007-0856,,"TmComm.sys 1.5.0.1052 in the Trend Micro Anti-Rootkit Common Module (RCM), with the VsapiNI.sys 3.320.0.1003 scan engine, as used in Trend Micro PC-cillin Internet Security 2007, Antivirus 2007, Anti-Spyware for SMB 3.2 SP1, Anti-Spyware for Consumer 3.5, Anti-Spyware for Enterprise 3.0 SP2, Client / Server / Messaging Security for SMB 3.5, Damage Cleanup Services 3.2, and possibly other products, assigns Everyone write permission for the \\.\TmComm DOS device interface, which allows local users to access privileged IOCTLs and execute arbitrary code or overwrite arbitrary memory in the kernel context.",Trend Micro,"Trend Micro Antispyware,Damage Cleanup Services,Tmcomm.sys,Trend Micro Antirootkit Common Module,Pc-cillin Internet Security,Client-server-messaging Security,VSAPini.sys,Trend Micro Antivirus",,,0.0004199999966658652,false,false,false,false,,false,false,2007-02-08T18:00:00.000Z,0