Описание
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Issue Tracking
- Third Party Advisory
- Third Party Advisory
- Broken Link
- Issue Tracking
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
Конфигурация 2
cpe:2.3:a:jython_project:jython:2.2.1:*:*:*:*:*:*:*
EPSS
Процентиль: 5%
0.00021
Низкий
4.6 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
ubuntu
почти 11 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
redhat
почти 13 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
debian
почти 11 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class ...
EPSS
Процентиль: 5%
0.00021
Низкий
4.6 Medium
CVSS2
Дефекты
CWE-264