Loading...
Loading...
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
February 13, 2015
May 6, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2013-2027
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.