Lucene search

K
cvelistRedhatCVELIST:CVE-2013-2027
HistoryFeb 13, 2015 - 3:00 p.m.

CVE-2013-2027

2015-02-1315:00:00
redhat
www.cve.org

8.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

8.8 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%