Vulnerabilities (CVE)

Filtered by vendor Jython Project Subscribe
Total 2 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2013-2027 2 Jython Project, Opensuse 2 Jython, Opensuse 2024-11-21 4.6 MEDIUM N/A
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVE-2016-4000 2 Debian, Jython Project 2 Debian Linux, Jython 2024-02-04 7.5 HIGH 9.8 CRITICAL
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.