CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Date published : 2015-02-13
http://advisories.mageia.org/MGASA-2015-0096.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html