Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jython project vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-4000
Jython prior to 2.7.1rc1 allows malicious users to execute arbitrary code via a crafted serialized PyFunction object.
Jython Project Jython 2.7.0
Debian Debian Linux 8.0
1 Article
NA
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Jython Project Jython 2.2.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started