Search for packages
| purl | pkg:deb/debian/jython@2.5.3-16%2Bdeb9u1 |
| Next non-vulnerable version | 2.7.1+repack1-4~deb10u1 |
| Latest non-vulnerable version | 2.7.1+repack1-4~deb10u1 |
| Risk | 4.5 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-eer2-83dz-ryea
Aliases: CVE-2013-2027 GHSA-9347-9w64-q5wp |
Jython Improper Access Restrictions vulnerability Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors. |
Affected by 0 other vulnerabilities. |
|
VCID-vkq3-8asa-77aj
Aliases: CVE-2016-4000 GHSA-6r7r-jj8h-pq6v |
Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-vkq3-8asa-77aj | Jython before 2.7.1rc1 allows attackers to execute arbitrary code via a crafted serialized PyFunction object. |
CVE-2016-4000
GHSA-6r7r-jj8h-pq6v |