CVE-2013-2027
13.02.2015, 15:59
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.Enginsight
| Vendor | Product | Version |
|---|---|---|
| opensuse | opensuse | 13.1 |
| opensuse | opensuse | 13.2 |
| jython_project | jython | 2.2.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References