CVE-2013-2027
13.02.2015, 15:59
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.Enginsight
Vendor | Product | Version |
---|---|---|
opensuse | opensuse | 13.1 |
opensuse | opensuse | 13.2 |
jython_project | jython | 2.2.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References