Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-2027

Опубликовано: 13 фев. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

РелизСтатусПримечание
devel

released

2.5.3-17ubuntu1
esm-apps/xenial

released

2.5.3-9ubuntu0.1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [2.5.3-1ubuntu0.1]]
lucid

ignored

end of life
precise

ignored

end of life
precise/esm

DNE

precise was needed
trusty

released

2.5.3-1ubuntu0.1
trusty/esm

DNE

trusty was released [2.5.3-1ubuntu0.1]
upstream

needs-triage

utopic

ignored

end of life

Показывать по

Ссылки на источники

EPSS

Процентиль: 5%
0.00021
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

nvd
почти 11 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

debian
почти 11 лет назад

Jython 2.2.1 uses the current umask to set the privileges of the class ...

github
больше 3 лет назад

Jython Improper Access Restrictions vulnerability

EPSS

Процентиль: 5%
0.00021
Низкий

4.6 Medium

CVSS2