Количество 5
Количество 5
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class ...
GHSA-9347-9w64-q5wp
Jython Improper Access Restrictions vulnerability
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2013-2027 Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. | CVSS2: 4.6 | 0% Низкий | почти 11 лет назад | |
CVE-2013-2027 Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. | CVSS2: 3.7 | 0% Низкий | почти 13 лет назад | |
CVE-2013-2027 Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. | CVSS2: 4.6 | 0% Низкий | почти 11 лет назад | |
CVE-2013-2027 Jython 2.2.1 uses the current umask to set the privileges of the class ... | CVSS2: 4.6 | 0% Низкий | почти 11 лет назад | |
GHSA-9347-9w64-q5wp Jython Improper Access Restrictions vulnerability | 0% Низкий | больше 3 лет назад |
Уязвимостей на страницу