python3-pillow vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-pillow package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
Improper Input Validation

<0:5.1.1-21.el8_10
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_6
  • H
Arbitrary Command Injection

<0:5.1.1-15.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-15.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-15.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-15.el8_2
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_6
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_6
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_6
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_8
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_8
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_8
  • H
Arbitrary Command Injection

<0:5.1.1-19.el8_8
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_9.1
  • M
Resource Exhaustion

<0:5.1.1-20.el8
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_2
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-13.el8_1
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_2
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_2
  • H
Arbitrary Command Injection

<0:5.1.1-18.el8_5
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_4
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_2
  • H
Arbitrary Command Injection

<0:5.1.1-14.el8_4
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Improper Initialization

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-13.el8_1
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_4
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_4
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_4
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_4
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-18.el8_5
  • H
Out-of-bounds Read

<0:5.1.1-14.el8_2
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • M
Out-of-Bounds

<0:5.1.1-16.el8
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-11.el8_1
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-11.el8_1
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-11.el8_0
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Heap-based Buffer Overflow

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_0
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Write

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_0
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-Bounds

<0:5.1.1-10.el8_1
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Out-of-bounds Read

<0:5.1.1-12.el8_2
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_0
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • H
Allocation of Resources Without Limits or Throttling

<0:5.1.1-10.el8_1
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Out-of-bounds Read

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Buffer Overflow

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Heap-based Buffer Overflow

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • M
Improper Input Validation

<0:5.1.1-16.el8
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*
  • L
Out-of-bounds Read

*