CVE-2013-2027

EUVD-2022-3281
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.6 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 5%
Affected Products (NVD)
VendorProductVersion
opensuseopensuse
13.1
opensuseopensuse
13.2
jython_projectjython
2.2.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
jython
bookworm
2.7.3+repack1-1
fixed
bullseye
2.7.2+repack1-3
fixed
jessie
ignored
sid
2.7.3+repack1-1
fixed
squeeze
no-dsa
stretch
ignored
trixie
2.7.3+repack1-1
fixed
wheezy
no-dsa
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
jython
lucid
ignored
precise
ignored
trusty
Fixed 2.5.3-1ubuntu0.1
released
utopic
ignored
vivid
ignored
wily
ignored
xenial
Fixed 2.5.3-9ubuntu0.1
released
yakkety
ignored
zesty
Fixed 2.5.3-15ubuntu0.1
released
Common Weakness Enumeration