Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2013-2027

Disclosure Date: February 13, 2015
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

General Information

Technical Analysis