pillow vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the pillow package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
CVE-2024-28219

<10.3.0-1
  • H
Arbitrary Code Injection

<10.2.0-1
  • H
Allocation of Resources Without Limits or Throttling

<10.0.0-1
  • H
CVE-2022-45198

<9.2.0-1
  • H
Resource Exhaustion

<9.3.0-1
  • C
Out-of-bounds Write

<9.1.1-1
  • C
CVE-2022-24303

<9.0.1-1
  • C
CVE-2022-22817

<9.0.0-1
  • M
Improper Initialization

<9.0.0-1
  • M
Out-of-bounds Read

<9.0.0-1
  • H
Out-of-bounds Read

<8.3.2-1
  • C
Buffer Overflow

<8.1.2+dfsg-0.3
  • M
Unchecked Return Value

<8.1.2+dfsg-0.2
  • L
Out-of-bounds Read

<8.1.2+dfsg-0.2
  • M
Insufficient Verification of Data Authenticity

<8.1.2+dfsg-0.2
  • L
Out-of-bounds Read

<8.1.2+dfsg-0.2
  • H
CVE-2021-28677

<8.1.2+dfsg-0.2
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<8.1.2+dfsg-0.2
  • H
Out-of-bounds Read

<8.1.1-1
  • M
CVE-2021-25292

<8.1.1-1
  • H
Out-of-bounds Read

<8.1.1-1
  • H
Out-of-bounds Write

<8.1.1-1
  • C
Out-of-bounds Write

<8.1.1-1
  • H
Resource Exhaustion

<8.1.2-1
  • H
Resource Exhaustion

<8.1.2-1
  • H
Resource Exhaustion

<8.1.2-1
  • M
Out-of-bounds Read

<8.1.0-1
  • H
Out-of-bounds Write

<8.1.0-1
  • H
Out-of-bounds Read

<8.1.0-1
  • M
Out-of-bounds Read

<7.2.0-1
  • M
Out-of-bounds Read

<7.2.0-1
  • H
Buffer Overflow

<7.2.0-1
  • L
Out-of-bounds Read

<7.2.0-1
  • L
Out-of-bounds Read

<7.2.0-1
  • H
Integer Overflow or Wraparound

<7.0.0-1
  • C
Buffer Overflow

<7.0.0-1
  • H
Integer Overflow or Wraparound

<7.0.0-1
  • C
Buffer Overflow

<7.0.0-1
  • H
Out-of-bounds Read

<7.0.0-1
  • L
Allocation of Resources Without Limits or Throttling

<6.2.0-1
  • L
Out-of-Bounds

<3.2.0-1
  • H
Improper Access Control

<3.4.2-1
  • M
Integer Overflow or Wraparound

<3.4.2-1
  • C
Out-of-Bounds

<3.1.1-1
  • M
Out-of-Bounds

<3.1.1-1
  • M
Out-of-Bounds

<3.1.1-1
  • M
Out-of-Bounds

<3.1.1-1
  • M
Resource Management Errors

<2.5.3-1
  • M
Improper Input Validation

<2.6.1-2
  • M
Improper Input Validation

<2.5.3-1
  • C
OS Command Injection

<2.4.0-1
  • L
Access Restriction Bypass

<2.4.0-1
  • L
Link Following

<2.4.0-1