Описание
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 2.5.3-17ubuntu1 |
| esm-apps/xenial | released | 2.5.3-9ubuntu0.1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [2.5.3-1ubuntu0.1]] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
| precise/esm | DNE | precise was needed |
| trusty | released | 2.5.3-1ubuntu0.1 |
| trusty/esm | DNE | trusty was released [2.5.3-1ubuntu0.1] |
| upstream | needs-triage | |
| utopic | ignored | end of life |
Показывать по
10
Ссылки на источники
EPSS
Процентиль: 5%
0.00021
Низкий
4.6 Medium
CVSS2
Связанные уязвимости
redhat
почти 13 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
nvd
почти 11 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
debian
почти 11 лет назад
Jython 2.2.1 uses the current umask to set the privileges of the class ...
EPSS
Процентиль: 5%
0.00021
Низкий
4.6 Medium
CVSS2