Vulnerability Database

308,820

Total vulnerabilities in the database

CVE-2013-2027

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

  • Published: Feb 13, 2015
  • Updated: Nov 9, 2025
  • CVE: CVE-2013-2027
  • Severity: Low
  • Exploit:

CVSS v2:

  • Severity: Low
  • Score: 4.6
  • AV:L/AC:L/Au:N/C:P/I:P/A:P

CWEs: