Product:

Jython

(Jython_project)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2017-07-06 CVE-2016-4000 Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object. Debian_linux, Jython 9.8
2015-02-13 CVE-2013-2027 Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. Jython, Opensuse N/A