Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-2027

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 2.7%
CVSS Severity
CVSS v2 Score 4.6
Products affected by CVE-2013-2027


Contact Us

Shodan ® - All rights reserved