Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.python/jython-standalone@2.7.2b3
Typemaven
Namespaceorg.python
Namejython-standalone
Version2.7.2b3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-eer2-83dz-ryea
vulnerability_id VCID-eer2-83dz-ryea
summary
Jython Improper Access Restrictions vulnerability
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
references
0
reference_url http://advisories.mageia.org/MGASA-2015-0096.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://advisories.mageia.org/MGASA-2015-0096.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2027.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2027.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2027
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05705
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05717
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0571
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05776
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05753
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05746
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05741
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05696
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05642
published_at 2026-04-01T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2027
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=947949
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=947949
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
6
reference_url https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
7
reference_url https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
9
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777079
reference_id 777079
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777079
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2027
reference_id CVE-2013-2027
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2027
12
reference_url https://github.com/advisories/GHSA-9347-9w64-q5wp
reference_id GHSA-9347-9w64-q5wp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9347-9w64-q5wp
fixed_packages
0
url pkg:maven/org.python/jython-standalone@2.7.2b3
purl pkg:maven/org.python/jython-standalone@2.7.2b3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.python/jython-standalone@2.7.2b3
aliases CVE-2013-2027, GHSA-9347-9w64-q5wp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eer2-83dz-ryea
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.python/jython-standalone@2.7.2b3