CVE-2010-4512

EUVD-2010-4480
Cobbler before 2.0.4 uses an incorrect umask value, which allows local users to have an unspecified impact by leveraging world writable permissions for files and directories.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 30%
Affected Products (NVD)
VendorProductVersion
michael_dehaancobbler
𝑥
≤ 2.0.3.1-2
michael_dehaancobbler
0.1.1.7
michael_dehaancobbler
0.2.1
michael_dehaancobbler
0.2.2
michael_dehaancobbler
0.2.3
michael_dehaancobbler
0.2.5
michael_dehaancobbler
0.2.7
michael_dehaancobbler
0.2.8
michael_dehaancobbler
0.2.9
michael_dehaancobbler
0.3.0
michael_dehaancobbler
0.3.1
michael_dehaancobbler
0.3.3
michael_dehaancobbler
0.3.4
michael_dehaancobbler
0.3.5
michael_dehaancobbler
0.3.6
michael_dehaancobbler
0.3.7
michael_dehaancobbler
0.3.9
michael_dehaancobbler
0.4.0
michael_dehaancobbler
0.4.2
michael_dehaancobbler
0.4.3
michael_dehaancobbler
0.4.5
michael_dehaancobbler
0.4.6
michael_dehaancobbler
0.4.7
michael_dehaancobbler
0.4.8
michael_dehaancobbler
0.5.0
michael_dehaancobbler
0.6.0
michael_dehaancobbler
0.6.1
michael_dehaancobbler
0.6.3
michael_dehaancobbler
0.6.4
michael_dehaancobbler
0.6.5
michael_dehaancobbler
0.8.1
michael_dehaancobbler
0.8.3
michael_dehaancobbler
1.0.0
michael_dehaancobbler
1.0.2
michael_dehaancobbler
1.0.2-1
michael_dehaancobbler
1.0.3-1
michael_dehaancobbler
1.2.0
michael_dehaancobbler
1.2.2
michael_dehaancobbler
1.2.3
michael_dehaancobbler
1.2.5
michael_dehaancobbler
1.2.6
michael_dehaancobbler
1.2.7
michael_dehaancobbler
1.2.8
michael_dehaancobbler
1.2.8-1
michael_dehaancobbler
1.2.9
michael_dehaancobbler
1.2.9-1
michael_dehaancobbler
1.3.1
michael_dehaancobbler
1.3.1-1
michael_dehaancobbler
1.3.3
michael_dehaancobbler
1.3.3-1
michael_dehaancobbler
1.3.4
michael_dehaancobbler
1.3.4-1
michael_dehaancobbler
1.4.0
michael_dehaancobbler
1.4.0-2
michael_dehaancobbler
1.4.1
michael_dehaancobbler
1.4.1-1
michael_dehaancobbler
1.4.2
michael_dehaancobbler
1.4.2-1
michael_dehaancobbler
1.4.3
michael_dehaancobbler
1.4.3-4
michael_dehaancobbler
1.6.1
michael_dehaancobbler
1.6.1-1
michael_dehaancobbler
1.6.2
michael_dehaancobbler
1.6.2-1
michael_dehaancobbler
1.6.3
michael_dehaancobbler
1.6.3-1
michael_dehaancobbler
1.6.4
michael_dehaancobbler
1.6.4-1
michael_dehaancobbler
1.6.5
michael_dehaancobbler
1.6.5-1
michael_dehaancobbler
1.6.6
michael_dehaancobbler
1.6.6-1
michael_dehaancobbler
1.6.8
michael_dehaancobbler
1.6.8-1
michael_dehaancobbler
2.0.0
michael_dehaancobbler
2.0.0-1
michael_dehaancobbler
2.0.1
michael_dehaancobbler
2.0.1-1
michael_dehaancobbler
2.0.3
michael_dehaancobbler
2.0.3.1
𝑥
= Vulnerable software versions
Common Weakness Enumeration