Lookup for vulnerable packages by Package URL.

GET /api/packages/141949?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/141949?format=api",
    "purl": "pkg:pypi/pillow@0",
    "type": "pypi",
    "namespace": "",
    "name": "pillow",
    "version": "0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "12.1.1",
    "latest_non_vulnerable_version": "12.2.0",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5505?format=api",
            "vulnerability_id": "VCID-avx2-mahw-mqes",
            "summary": "Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4009.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4009.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89948",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90021",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90003",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90006",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90005",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8999",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89997",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89998",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89991",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89986",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8997",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89963",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05263",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8995",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4009"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4009"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hvr8-466p-75rh",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hvr8-466p-75rh"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-7.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-7.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/pull/1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/pull/1714"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201612-52"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/86064",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/86064"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327134",
                    "reference_id": "1327134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1327134"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4009",
                    "reference_id": "CVE-2016-4009",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "10.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4009"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/4257?format=api",
                    "purl": "pkg:pypi/pillow@3.1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b3au-rcgp-2fag"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-cas2-jb3y-vyhz"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-e3gp-zc2b-budg"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-h4x7-7fke-mqgp"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-hmmq-5772-bycm"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-m3tm-h4q9-9yay"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-sns1-ksqr-vbhr"
                        },
                        {
                            "vulnerability": "VCID-stft-hsk9-zfdy"
                        },
                        {
                            "vulnerability": "VCID-u1en-t8ux-uube"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        },
                        {
                            "vulnerability": "VCID-xk66-1d31-2qbk"
                        },
                        {
                            "vulnerability": "VCID-yccg-zw89-vqff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1"
                }
            ],
            "aliases": [
                "CVE-2016-4009",
                "GHSA-hvr8-466p-75rh",
                "PYSEC-2016-7"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-avx2-mahw-mqes"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6001?format=api",
            "vulnerability_id": "VCID-b3au-rcgp-2fag",
            "summary": "There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19911.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19911.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7663",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76597",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76506",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76609",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76606",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76571",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76564",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76511",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7654",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76522",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76554",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76565",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00965",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76592",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-19911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5gm3-px64-rw72",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5gm3-px64-rw72"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-19911"
                },
                {
                    "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4272-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4272-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4272-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4272-1/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2020/dsa-4631",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2020/dsa-4631"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789540",
                    "reference_id": "1789540",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789540"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224",
                    "reference_id": "948224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0420",
                    "reference_id": "RHSA-2021:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0420"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/9845?format=api",
                    "purl": "pkg:pypi/pillow@6.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-7bjx-gkf7-cke9"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@6.2.2"
                }
            ],
            "aliases": [
                "CVE-2019-19911",
                "GHSA-5gm3-px64-rw72",
                "PYSEC-2020-172"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3au-rcgp-2fag"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5504?format=api",
            "vulnerability_id": "VCID-dgds-v95g-pbcv",
            "summary": "Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0740.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0740.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3502",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34732",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3496",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35005",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35252",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35221",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35245",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35207",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35277",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35096",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35296",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00148",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35325",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hggx-3h72-49ww",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hggx-3h72-49ww"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-5.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-5.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201612-52"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3499"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298874",
                    "reference_id": "1298874",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1298874"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813905",
                    "reference_id": "813905",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813905"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0740",
                    "reference_id": "CVE-2016-0740",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0740"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3090-1/",
                    "reference_id": "USN-3090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3090-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/4257?format=api",
                    "purl": "pkg:pypi/pillow@3.1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b3au-rcgp-2fag"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-cas2-jb3y-vyhz"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-e3gp-zc2b-budg"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-h4x7-7fke-mqgp"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-hmmq-5772-bycm"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-m3tm-h4q9-9yay"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-sns1-ksqr-vbhr"
                        },
                        {
                            "vulnerability": "VCID-stft-hsk9-zfdy"
                        },
                        {
                            "vulnerability": "VCID-u1en-t8ux-uube"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        },
                        {
                            "vulnerability": "VCID-xk66-1d31-2qbk"
                        },
                        {
                            "vulnerability": "VCID-yccg-zw89-vqff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1"
                }
            ],
            "aliases": [
                "CVE-2016-0740",
                "GHSA-hggx-3h72-49ww",
                "PYSEC-2016-5"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgds-v95g-pbcv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5522?format=api",
            "vulnerability_id": "VCID-e3gp-zc2b-budg",
            "summary": "Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the \"crafted image file\" approach, related to an \"Integer Overflow\" issue affecting the Image.core.map_buffer in map.c component.",
            "references": [
                {
                    "reference_url": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9189.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9189.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58025",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58046",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58069",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58053",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58049",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57994",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5802",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57998",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57913",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58056",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58033",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00358",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57999",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9189",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9189"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9190",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9190"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rwr3-c2q8-gm56",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rwr3-c2q8-gm56"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-8.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-8.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/issues/2105",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/issues/2105"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201612-52"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3710"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/94234",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/94234"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382000",
                    "reference_id": "1382000",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1382000"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9189",
                    "reference_id": "CVE-2016-9189",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "6.9",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9189"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3229-1/",
                    "reference_id": "USN-3229-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3229-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3230-1/",
                    "reference_id": "USN-3230-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3230-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/4497?format=api",
                    "purl": "pkg:pypi/pillow@3.3.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b3au-rcgp-2fag"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-cas2-jb3y-vyhz"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-h4x7-7fke-mqgp"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-hmmq-5772-bycm"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-m3tm-h4q9-9yay"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-sns1-ksqr-vbhr"
                        },
                        {
                            "vulnerability": "VCID-stft-hsk9-zfdy"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        },
                        {
                            "vulnerability": "VCID-xk66-1d31-2qbk"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.3.2"
                }
            ],
            "aliases": [
                "CVE-2016-9189",
                "GHSA-rwr3-c2q8-gm56",
                "PYSEC-2016-8"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e3gp-zc2b-budg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6292?format=api",
            "vulnerability_id": "VCID-en6t-uxtq-bfek",
            "summary": "An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25289.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25289.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42926",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43005",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4304",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43017",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43004",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42954",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43018",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4299",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43036",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.43048",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00206",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42988",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00762",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73401",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.746",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25289"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-57h3-9rgr-c24m",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-57h3-9rgr-c24m"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/cbfdde7b1f2295059a20a539ee9960f0bec7b299",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/cbfdde7b1f2295059a20a539ee9960f0bec7b299"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25289",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25289"
                },
                {
                    "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-33"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934680",
                    "reference_id": "1934680",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934680"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1635",
                    "reference_id": "AVG-1635",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3917",
                    "reference_id": "RHSA-2021:3917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3917"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4763-1/",
                    "reference_id": "USN-4763-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4763-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/15250?format=api",
                    "purl": "pkg:pypi/pillow@8.1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.1"
                }
            ],
            "aliases": [
                "BIT-pillow-2021-25289",
                "CVE-2021-25289",
                "GHSA-57h3-9rgr-c24m",
                "PYSEC-2021-35"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-en6t-uxtq-bfek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11396?format=api",
            "vulnerability_id": "VCID-n1hp-atex-ubh4",
            "summary": "An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44271.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44271.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-44271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44263",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44438",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44447",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44392",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44423",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44406",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44399",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44347",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44391",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00218",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44413",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00224",
                            "scoring_system": "epss",
                            "scoring_elements": "0.45083",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-44271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219"
                },
                {
                    "reference_url": "https://devhub.checkmarx.com/cve-details/CVE-2023-44271/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-44271/"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/pull/7244",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/pull/7244"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247820",
                    "reference_id": "2247820",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247820"
                },
                {
                    "reference_url": "https://devhub.checkmarx.com/cve-details/CVE-2023-44271",
                    "reference_id": "CVE-2023-44271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://devhub.checkmarx.com/cve-details/CVE-2023-44271"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44271",
                    "reference_id": "CVE-2023-44271",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-44271"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8ghj-p4vj-mr35",
                    "reference_id": "GHSA-8ghj-p4vj-mr35",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8ghj-p4vj-mr35"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-12",
                    "reference_id": "GLSA-202405-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0345",
                    "reference_id": "RHSA-2024:0345",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0345"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1057",
                    "reference_id": "RHSA-2024:1057",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1057"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:3005",
                    "reference_id": "RHSA-2024:3005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:3005"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6618-1/",
                    "reference_id": "USN-6618-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6618-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8135-1/",
                    "reference_id": "USN-8135-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8135-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/41011?format=api",
                    "purl": "pkg:pypi/pillow@10.0.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@10.0.0"
                }
            ],
            "aliases": [
                "BIT-pillow-2023-44271",
                "CVE-2023-44271",
                "GHSA-8ghj-p4vj-mr35",
                "PYSEC-2023-227"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n1hp-atex-ubh4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6295?format=api",
            "vulnerability_id": "VCID-rncf-9nf8-wud3",
            "summary": "An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25290.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25290.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34335",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34596",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34582",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34621",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3462",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34591",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34548",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34679",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00143",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34653",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0024",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47273",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00247",
                            "scoring_system": "epss",
                            "scoring_elements": "0.47959",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-25290"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8xjq-8fcg-g5hw",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8xjq-8fcg-g5hw"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/e25be1e33dc526bfd1094bc778a54d8e29bf66c9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/e25be1e33dc526bfd1094bc778a54d8e29bf66c9"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25290",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-25290"
                },
                {
                    "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "8.7",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-33"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934685",
                    "reference_id": "1934685",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934685"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1635",
                    "reference_id": "AVG-1635",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1635"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3917",
                    "reference_id": "RHSA-2021:3917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3917"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4149",
                    "reference_id": "RHSA-2021:4149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4149"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4763-1/",
                    "reference_id": "USN-4763-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4763-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/8135-1/",
                    "reference_id": "USN-8135-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/8135-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/15250?format=api",
                    "purl": "pkg:pypi/pillow@8.1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.1"
                }
            ],
            "aliases": [
                "BIT-pillow-2021-25290",
                "CVE-2021-25290",
                "GHSA-8xjq-8fcg-g5hw",
                "PYSEC-2021-36"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rncf-9nf8-wud3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5998?format=api",
            "vulnerability_id": "VCID-stft-hsk9-zfdy",
            "summary": "libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-5310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6988",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69829",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69848",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69838",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69796",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69825",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69802",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69786",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69738",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69761",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69745",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00611",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69734",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-5310"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vcqg-3p29-xw73",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vcqg-3p29-xw73"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/"
                },
                {
                    "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4272-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4272-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4272-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4272-1/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789538",
                    "reference_id": "1789538",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1789538"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224",
                    "reference_id": "948224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5310",
                    "reference_id": "CVE-2020-5310",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-5310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0420",
                    "reference_id": "RHSA-2021:0420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0420"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/9845?format=api",
                    "purl": "pkg:pypi/pillow@6.2.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-7bjx-gkf7-cke9"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@6.2.2"
                }
            ],
            "aliases": [
                "BIT-pillow-2020-5310",
                "CVE-2020-5310",
                "GHSA-vcqg-3p29-xw73",
                "PYSEC-2020-81"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stft-hsk9-zfdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6245?format=api",
            "vulnerability_id": "VCID-x15z-dejc-9ba6",
            "summary": "In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35653.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35653.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52619",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52668",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52684",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52676",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52639",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52654",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52671",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52626",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52575",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52608",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52536",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.52581",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-35653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-f5g8-5qq7-938w",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-f5g8-5qq7-938w"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/2f409261eb1228e166868f8f0b5da5cda52e55bf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/2f409261eb1228e166868f8f0b5da5cda52e55bf"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-35653"
                },
                {
                    "reference_url": "https://pillow.readthedocs.io/en/stable/releasenotes/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://pillow.readthedocs.io/en/stable/releasenotes/index.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915420",
                    "reference_id": "1915420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1915420"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202101-11",
                    "reference_id": "ASA-202101-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202101-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1438",
                    "reference_id": "AVG-1438",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1438"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202101-08",
                    "reference_id": "GLSA-202101-08",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202101-08"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3917",
                    "reference_id": "RHSA-2021:3917",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3917"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4149",
                    "reference_id": "RHSA-2021:4149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4149"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4697-1/",
                    "reference_id": "USN-4697-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4697-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4697-2/",
                    "reference_id": "USN-4697-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4697-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/14775?format=api",
                    "purl": "pkg:pypi/pillow@8.1.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.0"
                }
            ],
            "aliases": [
                "BIT-pillow-2020-35653",
                "CVE-2020-35653",
                "GHSA-f5g8-5qq7-938w",
                "PYSEC-2021-69"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x15z-dejc-9ba6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5509?format=api",
            "vulnerability_id": "VCID-zmd3-henq-r7bd",
            "summary": "Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2533.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2533.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8433",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84452",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84388",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84344",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84364",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84366",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84426",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84424",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84401",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84405",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02195",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84411",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-2533"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-3c5c-7235-994j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-3c5c-7235-994j"
                },
                {
                    "reference_url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-19.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-19.yaml"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b"
                },
                {
                    "reference_url": "https://github.com/python-pillow/Pillow/pull/1706",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/python-pillow/Pillow/pull/1706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201612-52",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201612-52"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2016/dsa-3499"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/02/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/02/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/22/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/22/2"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304504",
                    "reference_id": "1304504",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304504"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2533",
                    "reference_id": "CVE-2016-2533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv4",
                            "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2533"
                },
                {
                    "reference_url": "http://www.cvedetails.com/cve/CVE-2016-2533/",
                    "reference_id": "CVE-2016-2533",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.cvedetails.com/cve/CVE-2016-2533/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3080-1/",
                    "reference_id": "USN-3080-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3080-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3090-1/",
                    "reference_id": "USN-3090-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3090-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/4257?format=api",
                    "purl": "pkg:pypi/pillow@3.1.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-19e1-19hk-duet"
                        },
                        {
                            "vulnerability": "VCID-1vt7-c6e3-7qc8"
                        },
                        {
                            "vulnerability": "VCID-3qb5-8p8w-gkad"
                        },
                        {
                            "vulnerability": "VCID-3uk9-eds5-rkgc"
                        },
                        {
                            "vulnerability": "VCID-53ac-ceq4-qkhf"
                        },
                        {
                            "vulnerability": "VCID-5rv4-k1q9-zue2"
                        },
                        {
                            "vulnerability": "VCID-64n5-pugj-vue8"
                        },
                        {
                            "vulnerability": "VCID-6gyu-fzpg-c3bn"
                        },
                        {
                            "vulnerability": "VCID-8n2b-wvya-53e1"
                        },
                        {
                            "vulnerability": "VCID-9ckw-ra54-z3b7"
                        },
                        {
                            "vulnerability": "VCID-and9-6jty-pyeq"
                        },
                        {
                            "vulnerability": "VCID-aubw-tsmn-ffcq"
                        },
                        {
                            "vulnerability": "VCID-b3au-rcgp-2fag"
                        },
                        {
                            "vulnerability": "VCID-b5a2-83ej-puaw"
                        },
                        {
                            "vulnerability": "VCID-brp2-dtrf-jyfr"
                        },
                        {
                            "vulnerability": "VCID-cas2-jb3y-vyhz"
                        },
                        {
                            "vulnerability": "VCID-d7uf-zdbv-sba1"
                        },
                        {
                            "vulnerability": "VCID-df4x-jt3h-17hx"
                        },
                        {
                            "vulnerability": "VCID-dpc3-td9q-dyee"
                        },
                        {
                            "vulnerability": "VCID-e3gp-zc2b-budg"
                        },
                        {
                            "vulnerability": "VCID-en6t-uxtq-bfek"
                        },
                        {
                            "vulnerability": "VCID-g46h-p8jk-cuhc"
                        },
                        {
                            "vulnerability": "VCID-gvjw-funa-sqak"
                        },
                        {
                            "vulnerability": "VCID-h4x7-7fke-mqgp"
                        },
                        {
                            "vulnerability": "VCID-haum-8zpg-6kgf"
                        },
                        {
                            "vulnerability": "VCID-hmmq-5772-bycm"
                        },
                        {
                            "vulnerability": "VCID-khp6-9hfx-1kge"
                        },
                        {
                            "vulnerability": "VCID-m3tm-h4q9-9yay"
                        },
                        {
                            "vulnerability": "VCID-n1hp-atex-ubh4"
                        },
                        {
                            "vulnerability": "VCID-n1w5-f5p7-xuhb"
                        },
                        {
                            "vulnerability": "VCID-p6r3-puh1-zyg6"
                        },
                        {
                            "vulnerability": "VCID-q4bb-qnxe-8bfa"
                        },
                        {
                            "vulnerability": "VCID-rncf-9nf8-wud3"
                        },
                        {
                            "vulnerability": "VCID-sns1-ksqr-vbhr"
                        },
                        {
                            "vulnerability": "VCID-stft-hsk9-zfdy"
                        },
                        {
                            "vulnerability": "VCID-u1en-t8ux-uube"
                        },
                        {
                            "vulnerability": "VCID-ue18-zzau-x7hy"
                        },
                        {
                            "vulnerability": "VCID-uf5t-asns-tudp"
                        },
                        {
                            "vulnerability": "VCID-vdzj-kqfy-d3b7"
                        },
                        {
                            "vulnerability": "VCID-vwbu-ruxm-tbh4"
                        },
                        {
                            "vulnerability": "VCID-vxh1-8rvt-kkak"
                        },
                        {
                            "vulnerability": "VCID-vyzt-df2u-h3cc"
                        },
                        {
                            "vulnerability": "VCID-w9uy-fnpm-cbak"
                        },
                        {
                            "vulnerability": "VCID-x15z-dejc-9ba6"
                        },
                        {
                            "vulnerability": "VCID-xesd-d294-7fcx"
                        },
                        {
                            "vulnerability": "VCID-xk66-1d31-2qbk"
                        },
                        {
                            "vulnerability": "VCID-yccg-zw89-vqff"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1"
                }
            ],
            "aliases": [
                "CVE-2016-2533",
                "GHSA-3c5c-7235-994j",
                "PYSEC-2016-19"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zmd3-henq-r7bd"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@0"
}