cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2012-3487,https://securityvulnerability.io/vulnerability/CVE-2012-3487,,Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process.,Google,Tunnelblick,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-3483,https://securityvulnerability.io/vulnerability/CVE-2012-3483,,Race condition in the runScript function in Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by replacing a script file.,Google,Tunnelblick,,,0.0006200000061653554,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-3486,https://securityvulnerability.io/vulnerability/CVE-2012-3486,,Tunnelblick 3.3beta20 and earlier allows local users to gain privileges via an OpenVPN configuration file that specifies execution of a script upon occurrence of an OpenVPN event.,Google,Tunnelblick,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-4676,https://securityvulnerability.io/vulnerability/CVE-2012-4676,,"The errorExitIfAttackViaString function in Tunnelblick 3.3beta20 and earlier allows local users to delete arbitrary files by constructing a (1) symlink or (2) hard link, a different vulnerability than CVE-2012-3485.",Google,Tunnelblick,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-3484,https://securityvulnerability.io/vulnerability/CVE-2012-3484,,"Tunnelblick 3.3beta20 and earlier relies on a test for specific ownership and permissions to determine whether a program can be safely executed, which allows local users to bypass intended access restrictions and gain privileges via a (1) user-mountable image or (2) network share.",Google,Tunnelblick,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-4677,https://securityvulnerability.io/vulnerability/CVE-2012-4677,,Tunnelblick 3.3beta20 and earlier allows local users to gain privileges by using a crafted Info.plist file to control the gOkIfNotSecure value.,Google,Tunnelblick,,,0.0004199999966658652,false,false,false,false,,false,false,2012-08-26T19:55:00.000Z,0 CVE-2012-3485,https://securityvulnerability.io/vulnerability/CVE-2012-3485,,"Tunnelblick 3.3beta20 and earlier relies on argv[0] to determine the name of an appropriate (1) kernel module pathname or (2) executable file pathname, which allows local users to gain privileges via an execl system call.",Google,Tunnelblick,,,0.002360000042244792,false,false,false,false,,false,false,2012-08-26T19:00:00.000Z,0