Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jython project vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-4000
Jython prior to 2.7.1rc1 allows malicious users to execute arbitrary code via a crafted serialized PyFunction object.
Jython Project Jython 2.7.0
Debian Debian Linux 8.0
1 Article
4.6
CVSSv2
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Jython Project Jython 2.2.1
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-2907
hardcoded
inject
CVE-2024-20359
CVE-2024-2467
CVE-2024-4077
CVE-2024-22391
camera
CVE-2024-20353
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started