Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
python pillow 2.5.3 vulnerabilities and exploits
(subscribe to this query)
5.5
CVSSv3
CVE-2016-3076
Heap-based buffer overflow in the j2k_encode_entry function in Pillow 2.5.0 up to and including 3.1.1 allows remote malicious users to cause a denial of service (memory corruption) via a crafted Jpeg2000 file.
Python Pillow 2.9.0
Python Pillow 2.5.1
Python Pillow 2.5.2
Python Pillow 3.0.0
Python Pillow 2.5.3
Python Pillow 2.6.2
Python Pillow 2.6.0
Python Pillow 2.5.0
Python Pillow 2.7.0
Python Pillow 3.1.0
Python Pillow 2.6.1
Python Pillow 2.8.2
Python Pillow 2.8.1
Python Pillow 2.8.0
2 Github repositories
NA
CVE-2014-3598
The Jpeg2KImagePlugin plugin in Pillow prior to 2.5.3 allows remote malicious users to cause a denial of service via a crafted image.
Opensuse Opensuse 13.2
Python Pillow
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started