Vulnerabilities
Vulnerable Software
Jython Project:  >> Jython  Security Vulnerabilities
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
CVSS Score
9.8
EPSS Score
0.156
Published
2017-07-06
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
CVSS Score
4.6
EPSS Score
0.0
Published
2015-02-13


Contact Us

Shodan ® - All rights reserved