Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
jython vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2016-4000
Jython prior to 2.7.1rc1 allows malicious users to execute arbitrary code via a crafted serialized PyFunction object.
Jython Project Jython 2.7.0
Debian Debian Linux 8.0
1 Article
4.6
CVSSv2
CVE-2013-2027
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
Opensuse Opensuse 13.1
Opensuse Opensuse 13.2
Jython Project Jython 2.2.1
4.3
CVSSv2
CVE-2019-16935
The documentation XML-RPC server in Python up to and including 2.7.16, 3.x up to and including 3.6.9, and 3.7.x up to and including 3.7.4 has XSS via the server_title field. This occurs in Lib/DocXMLRPCServer.py in Python 2.x, and in Lib/xmlrpc/server.py in Python 3.x. If set_ser...
Python Python
Debian Debian Linux 9.0
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.04
Canonical Ubuntu Linux 14.04
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 12.04
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4644
unprivileged
CVE-2024-3494
CVE-2024-22460
CVE-2024-26026
CVE-2024-23473
firewall
CVE-2024-28889
XML external entity
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started