python-pillow-tk vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python-pillow-tk package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Resource Exhaustion

<0:2.0.0-24.gitd1c6db8.el7_9
  • H
Arbitrary Command Injection

<0:2.0.0-25.gitd1c6db8.el7_9
  • H
Arbitrary Command Injection

<0:2.0.0-23.gitd1c6db8.el7_9
  • H
Out-of-bounds Read

<0:2.0.0-23.gitd1c6db8.el7_9
  • M
Out-of-bounds Read

<0:2.0.0-21.gitd1c6db8.el7
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • M
Improper Input Validation

*
  • H
Arbitrary Command Injection

<0:2.0.0-25.gitd1c6db8.el7_9
  • M
Resource Exhaustion

<0:2.0.0-24.gitd1c6db8.el7_9
  • H
Arbitrary Command Injection

<0:2.0.0-23.gitd1c6db8.el7_9
  • M
Improper Initialization

*
  • H
Out-of-bounds Read

<0:2.0.0-23.gitd1c6db8.el7_9
  • M
Out-of-Bounds

*
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Out-of-Bounds

<0:2.0.0-20.gitd1c6db8.el7_7
  • M
Out-of-bounds Read

<0:2.0.0-21.gitd1c6db8.el7
  • M
Out-of-bounds Read

*
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • H
Allocation of Resources Without Limits or Throttling

<0:2.0.0-20.gitd1c6db8.el7_7
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Integer Overflow or Wraparound

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Improper Input Validation

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Out-of-bounds Read

*
  • M
Buffer Overflow

*
  • M
Improper Input Validation

*
  • L
Heap-based Buffer Overflow

*
  • L
Improper Input Validation

*
  • M
Heap-based Buffer Overflow

*
  • M
Buffer Overflow

*
  • M
Integer Overflow or Wraparound

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Information Exposure

*
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

*
  • M
OS Command Injection

*
  • L
Insecure Temporary File

*