Lucene search

K

Jython Project Security Vulnerabilities

cve
cve

CVE-2013-2027

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.

8.5AI Score

0.0004EPSS

2015-02-13 03:59 PM
44
cve
cve

CVE-2016-4000

Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.

9.8CVSS

8.6AI Score

0.013EPSS

2017-07-06 04:29 PM
62