Vulnerabilities
Vulnerable Software
Jython Project:  >> Jython  >> 2.2.1  Security Vulnerabilities
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVSS Score
4.6
EPSS Score
0.0
Published
2015-02-13


Contact Us

Shodan ® - All rights reserved