Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/jython@2.5.3-16%2Bdeb9u1
Typedeb
Namespacedebian
Namejython
Version2.5.3-16+deb9u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.7.1+repack1-4~deb10u1
Latest_non_vulnerable_version2.7.1+repack1-4~deb10u1
Affected_by_vulnerabilities
0
url VCID-eer2-83dz-ryea
vulnerability_id VCID-eer2-83dz-ryea
summary
Jython Improper Access Restrictions vulnerability
Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
references
0
reference_url http://advisories.mageia.org/MGASA-2015-0096.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://advisories.mageia.org/MGASA-2015-0096.html
1
reference_url http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-02/msg00055.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2027.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2027.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-2027
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05705
published_at 2026-04-18T12:55:00Z
1
value 0.00021
scoring_system epss
scoring_elements 0.05717
published_at 2026-04-04T12:55:00Z
2
value 0.00021
scoring_system epss
scoring_elements 0.0571
published_at 2026-04-07T12:55:00Z
3
value 0.00021
scoring_system epss
scoring_elements 0.0575
published_at 2026-04-08T12:55:00Z
4
value 0.00021
scoring_system epss
scoring_elements 0.05776
published_at 2026-04-09T12:55:00Z
5
value 0.00021
scoring_system epss
scoring_elements 0.05753
published_at 2026-04-11T12:55:00Z
6
value 0.00021
scoring_system epss
scoring_elements 0.05746
published_at 2026-04-12T12:55:00Z
7
value 0.00021
scoring_system epss
scoring_elements 0.05741
published_at 2026-04-13T12:55:00Z
8
value 0.00021
scoring_system epss
scoring_elements 0.05696
published_at 2026-04-16T12:55:00Z
9
value 0.00021
scoring_system epss
scoring_elements 0.05642
published_at 2026-04-01T12:55:00Z
10
value 0.00021
scoring_system epss
scoring_elements 0.05676
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-2027
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=947949
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=947949
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027
6
reference_url https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jython/frozen-mirror/blob/b8d7aa4cee50c0c0fe2f4b235dd62922dd0f3f99/NEWS#L25C8-L25C15
7
reference_url https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jython/frozen-mirror/commit/053949e66d307168fd70b39725f4d3e6b642acc1
8
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:158
9
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777079
reference_id 777079
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777079
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-2027
reference_id CVE-2013-2027
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-2027
12
reference_url https://github.com/advisories/GHSA-9347-9w64-q5wp
reference_id GHSA-9347-9w64-q5wp
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9347-9w64-q5wp
fixed_packages
0
url pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
purl pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.7.1%252Brepack1-4~deb10u1
aliases CVE-2013-2027, GHSA-9347-9w64-q5wp
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eer2-83dz-ryea
1
url VCID-vkq3-8asa-77aj
vulnerability_id VCID-vkq3-8asa-77aj
summary Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
references
0
reference_url http://bugs.jython.org/issue2454
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://bugs.jython.org/issue2454
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4000.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4000.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4000
reference_id
reference_type
scores
0
value 0.12492
scoring_system epss
scoring_elements 0.93923
published_at 2026-04-12T12:55:00Z
1
value 0.12492
scoring_system epss
scoring_elements 0.93922
published_at 2026-04-13T12:55:00Z
2
value 0.12492
scoring_system epss
scoring_elements 0.93919
published_at 2026-04-09T12:55:00Z
3
value 0.12492
scoring_system epss
scoring_elements 0.93915
published_at 2026-04-08T12:55:00Z
4
value 0.12492
scoring_system epss
scoring_elements 0.93906
published_at 2026-04-07T12:55:00Z
5
value 0.12492
scoring_system epss
scoring_elements 0.93903
published_at 2026-04-04T12:55:00Z
6
value 0.12492
scoring_system epss
scoring_elements 0.93894
published_at 2026-04-02T12:55:00Z
7
value 0.12492
scoring_system epss
scoring_elements 0.93885
published_at 2026-04-01T12:55:00Z
8
value 0.12492
scoring_system epss
scoring_elements 0.93949
published_at 2026-04-18T12:55:00Z
9
value 0.12492
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4000
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000
5
reference_url https://github.com/frohoff/ysoserial/blob/master/src/main/java/ysoserial/payloads/Jython1.java
reference_id
reference_type
scores
url https://github.com/frohoff/ysoserial/blob/master/src/main/java/ysoserial/payloads/Jython1.java
6
reference_url https://github.com/jythontools/jython/commit/4c337213bd2964bb36cef2d31509b49647ca6f2a
reference_id
reference_type
scores
url https://github.com/jythontools/jython/commit/4c337213bd2964bb36cef2d31509b49647ca6f2a
7
reference_url https://hg.python.org/jython/file/v2.7.1rc1/NEWS
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://hg.python.org/jython/file/v2.7.1rc1/NEWS
8
reference_url https://hg.python.org/jython/rev/d06e29d100c0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://hg.python.org/jython/rev/d06e29d100c0
9
reference_url https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E
10
reference_url https://security.gentoo.org/glsa/201710-28
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-28
11
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
12
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
14
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
15
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
16
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
18
reference_url http://www.debian.org/security/2017/dsa-3893
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2017/dsa-3893
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461928
reference_id 1461928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461928
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4000
reference_id CVE-2016-4000
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-4000
22
reference_url https://security-tracker.debian.org/tracker/CVE-2016-4000
reference_id CVE-2016-4000
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2016-4000
23
reference_url https://github.com/advisories/GHSA-6r7r-jj8h-pq6v
reference_id GHSA-6r7r-jj8h-pq6v
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6r7r-jj8h-pq6v
fixed_packages
0
url pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
purl pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.7.1%252Brepack1-4~deb10u1
aliases CVE-2016-4000, GHSA-6r7r-jj8h-pq6v
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq3-8asa-77aj
Fixing_vulnerabilities
0
url VCID-vkq3-8asa-77aj
vulnerability_id VCID-vkq3-8asa-77aj
summary Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object.
references
0
reference_url http://bugs.jython.org/issue2454
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://bugs.jython.org/issue2454
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4000.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4000.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4000
reference_id
reference_type
scores
0
value 0.12492
scoring_system epss
scoring_elements 0.93923
published_at 2026-04-12T12:55:00Z
1
value 0.12492
scoring_system epss
scoring_elements 0.93922
published_at 2026-04-13T12:55:00Z
2
value 0.12492
scoring_system epss
scoring_elements 0.93919
published_at 2026-04-09T12:55:00Z
3
value 0.12492
scoring_system epss
scoring_elements 0.93915
published_at 2026-04-08T12:55:00Z
4
value 0.12492
scoring_system epss
scoring_elements 0.93906
published_at 2026-04-07T12:55:00Z
5
value 0.12492
scoring_system epss
scoring_elements 0.93903
published_at 2026-04-04T12:55:00Z
6
value 0.12492
scoring_system epss
scoring_elements 0.93894
published_at 2026-04-02T12:55:00Z
7
value 0.12492
scoring_system epss
scoring_elements 0.93885
published_at 2026-04-01T12:55:00Z
8
value 0.12492
scoring_system epss
scoring_elements 0.93949
published_at 2026-04-18T12:55:00Z
9
value 0.12492
scoring_system epss
scoring_elements 0.93944
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4000
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864859
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000
5
reference_url https://github.com/frohoff/ysoserial/blob/master/src/main/java/ysoserial/payloads/Jython1.java
reference_id
reference_type
scores
url https://github.com/frohoff/ysoserial/blob/master/src/main/java/ysoserial/payloads/Jython1.java
6
reference_url https://github.com/jythontools/jython/commit/4c337213bd2964bb36cef2d31509b49647ca6f2a
reference_id
reference_type
scores
url https://github.com/jythontools/jython/commit/4c337213bd2964bb36cef2d31509b49647ca6f2a
7
reference_url https://hg.python.org/jython/file/v2.7.1rc1/NEWS
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://hg.python.org/jython/file/v2.7.1rc1/NEWS
8
reference_url https://hg.python.org/jython/rev/d06e29d100c0
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://hg.python.org/jython/rev/d06e29d100c0
9
reference_url https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.apache.org/thread.html/0919ec1db20b1022f22b8e78f355667df74d6142b463ff17d03ad533@%3Cdevnull.infra.apache.org%3E
10
reference_url https://security.gentoo.org/glsa/201710-28
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201710-28
11
reference_url https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
12
reference_url https://www.oracle.com/security-alerts/cpuapr2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2020.html
13
reference_url https://www.oracle.com/security-alerts/cpujan2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujan2020.html
14
reference_url https://www.oracle.com/security-alerts/cpujul2020.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2020.html
15
reference_url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
16
reference_url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
17
reference_url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
18
reference_url http://www.debian.org/security/2017/dsa-3893
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2017/dsa-3893
19
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1461928
reference_id 1461928
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1461928
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4000
reference_id CVE-2016-4000
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-4000
22
reference_url https://security-tracker.debian.org/tracker/CVE-2016-4000
reference_id CVE-2016-4000
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security-tracker.debian.org/tracker/CVE-2016-4000
23
reference_url https://github.com/advisories/GHSA-6r7r-jj8h-pq6v
reference_id GHSA-6r7r-jj8h-pq6v
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-6r7r-jj8h-pq6v
fixed_packages
0
url pkg:deb/debian/jython@2.5.3-3%2Bdeb8u1
purl pkg:deb/debian/jython@2.5.3-3%2Bdeb8u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eer2-83dz-ryea
1
vulnerability VCID-vkq3-8asa-77aj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.5.3-3%252Bdeb8u1
1
url pkg:deb/debian/jython@2.5.3-16%2Bdeb9u1
purl pkg:deb/debian/jython@2.5.3-16%2Bdeb9u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eer2-83dz-ryea
1
vulnerability VCID-vkq3-8asa-77aj
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.5.3-16%252Bdeb9u1
2
url pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
purl pkg:deb/debian/jython@2.7.1%2Brepack1-4~deb10u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.7.1%252Brepack1-4~deb10u1
aliases CVE-2016-4000, GHSA-6r7r-jj8h-pq6v
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vkq3-8asa-77aj
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/jython@2.5.3-16%252Bdeb9u1