Jython Project

Jython

2 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 15.58%
  • Published 06.07.2017 16:29:00
  • Last modified 20.04.2025 01:37:25

Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.

  • EPSS 0.03%
  • Published 13.02.2015 15:59:00
  • Last modified 12.04.2025 10:46:40

Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.