Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python pillow 2.5.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2014-3589
PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow prior to 2.3.2 and 2.5.x prior to 2.5.2 allows remote malicious users to cause a denial of service via a crafted block size.
Python Pillow 2.5.1
Debian Python-imaging -
Python Pillow 2.5.2
Python Pillow 2.5.0
Python Pillow 2.3.0
Python Pillow
Opensuse Opensuse 13.2
5.5
CVSSv3
CVE-2016-3076
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 up to and including 3.1.1 allows remote malicious users to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
Python Pillow 2.5.1
Python Pillow 3.0.0
Python Pillow 2.8.0
Python Pillow 2.6.1
Python Pillow 2.9.0
Python Pillow 2.8.2
Python Pillow 2.5.2
Python Pillow 2.6.0
Python Pillow 2.7.0
Python Pillow 2.6.2
Python Pillow 2.5.0
Python Pillow 3.1.0
Python Pillow 2.8.1
Python Pillow 2.5.3
2 Github repositories
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSRF
server-side request forgery
CVE-2024-30067
CVE-2024-5553
CVE-2024-30095
IDOR
CVE-2024-35252
CVE-2024-23692
CVE-2024-27801
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started