Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/pillow@2.4.0-1?distro=trixie
Typedeb
Namespacedebian
Namepillow
Version2.4.0-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.5.3-1
Latest_non_vulnerable_version12.2.0-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dgy9-uh9h-xfft
vulnerability_id VCID-dgy9-uh9h-xfft
summary The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1932.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1932.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1932
reference_id
reference_type
scores
0
value 0.00098
scoring_system epss
scoring_elements 0.26928
published_at 2026-04-21T12:55:00Z
1
value 0.00098
scoring_system epss
scoring_elements 0.26989
published_at 2026-04-16T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26981
published_at 2026-04-13T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.27037
published_at 2026-04-12T12:55:00Z
4
value 0.00098
scoring_system epss
scoring_elements 0.27082
published_at 2026-04-11T12:55:00Z
5
value 0.00098
scoring_system epss
scoring_elements 0.27078
published_at 2026-04-09T12:55:00Z
6
value 0.00098
scoring_system epss
scoring_elements 0.27033
published_at 2026-04-08T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.26964
published_at 2026-04-18T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27172
published_at 2026-04-04T12:55:00Z
9
value 0.00098
scoring_system epss
scoring_elements 0.2688
published_at 2026-04-24T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.26872
published_at 2026-04-26T12:55:00Z
11
value 0.00133
scoring_system epss
scoring_elements 0.32904
published_at 2026-04-01T12:55:00Z
12
value 0.00133
scoring_system epss
scoring_elements 0.33034
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1932
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1932
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-22.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-22.yaml
6
reference_url https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
7
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1932
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-1932
9
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
10
reference_url https://web.archive.org/web/20170103151725/http://www.securityfocus.com/bid/65511
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20170103151725/http://www.securityfocus.com/bid/65511
11
reference_url http://www.openwall.com/lists/oss-security/2014/02/11/1
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/11/1
12
reference_url http://www.securityfocus.com/bid/65511
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/65511
13
reference_url http://www.ubuntu.com/usn/USN-2168-1
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value 8.5
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2168-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1063658
reference_id 1063658
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1063658
15
reference_url https://github.com/advisories/GHSA-x895-2wrm-hvp7
reference_id GHSA-x895-2wrm-hvp7
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x895-2wrm-hvp7
16
reference_url https://usn.ubuntu.com/2168-1/
reference_id USN-2168-1
reference_type
scores
url https://usn.ubuntu.com/2168-1/
fixed_packages
0
url pkg:deb/debian/pillow@2.4.0-1?distro=trixie
purl pkg:deb/debian/pillow@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@8.1.2%252Bdfsg-0.3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@9.4.0-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@11.1.0-5%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/pillow@12.1.1-2?distro=trixie
purl pkg:deb/debian/pillow@12.1.1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.1.1-2%3Fdistro=trixie
5
url pkg:deb/debian/pillow@12.2.0-1?distro=trixie
purl pkg:deb/debian/pillow@12.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.2.0-1%3Fdistro=trixie
aliases CVE-2014-1932, GHSA-x895-2wrm-hvp7, PYSEC-2014-22
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgy9-uh9h-xfft
1
url VCID-gmd5-pbxc-a3gd
vulnerability_id VCID-gmd5-pbxc-a3gd
summary Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
references
0
reference_url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-1932.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-1932.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3007.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3007.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3007
reference_id
reference_type
scores
0
value 0.03008
scoring_system epss
scoring_elements 0.86627
published_at 2026-04-26T12:55:00Z
1
value 0.03008
scoring_system epss
scoring_elements 0.86527
published_at 2026-04-01T12:55:00Z
2
value 0.03008
scoring_system epss
scoring_elements 0.86538
published_at 2026-04-02T12:55:00Z
3
value 0.03008
scoring_system epss
scoring_elements 0.86556
published_at 2026-04-07T12:55:00Z
4
value 0.03008
scoring_system epss
scoring_elements 0.86575
published_at 2026-04-08T12:55:00Z
5
value 0.03008
scoring_system epss
scoring_elements 0.86585
published_at 2026-04-09T12:55:00Z
6
value 0.03008
scoring_system epss
scoring_elements 0.866
published_at 2026-04-11T12:55:00Z
7
value 0.03008
scoring_system epss
scoring_elements 0.86597
published_at 2026-04-12T12:55:00Z
8
value 0.03008
scoring_system epss
scoring_elements 0.8659
published_at 2026-04-13T12:55:00Z
9
value 0.03008
scoring_system epss
scoring_elements 0.86604
published_at 2026-04-16T12:55:00Z
10
value 0.03008
scoring_system epss
scoring_elements 0.86609
published_at 2026-04-18T12:55:00Z
11
value 0.03008
scoring_system epss
scoring_elements 0.86601
published_at 2026-04-21T12:55:00Z
12
value 0.03008
scoring_system epss
scoring_elements 0.86619
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3007
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737059
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3007
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-87.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-87.yaml
6
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3007
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-3007
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1094101
reference_id 1094101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1094101
9
reference_url https://github.com/advisories/GHSA-8m9x-pxwq-j236
reference_id GHSA-8m9x-pxwq-j236
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8m9x-pxwq-j236
fixed_packages
0
url pkg:deb/debian/pillow@2.4.0-1?distro=trixie
purl pkg:deb/debian/pillow@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@8.1.2%252Bdfsg-0.3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@9.4.0-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@11.1.0-5%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/pillow@12.1.1-2?distro=trixie
purl pkg:deb/debian/pillow@12.1.1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.1.1-2%3Fdistro=trixie
5
url pkg:deb/debian/pillow@12.2.0-1?distro=trixie
purl pkg:deb/debian/pillow@12.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.2.0-1%3Fdistro=trixie
aliases CVE-2014-3007, GHSA-8m9x-pxwq-j236, PYSEC-2014-87
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gmd5-pbxc-a3gd
2
url VCID-ptk9-u246-q7gh
vulnerability_id VCID-ptk9-u246-q7gh
summary The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2014-05/msg00002.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1933.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1933.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1933
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.29405
published_at 2026-04-21T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29515
published_at 2026-04-08T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29451
published_at 2026-04-18T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29479
published_at 2026-04-16T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29582
published_at 2026-04-02T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29631
published_at 2026-04-04T12:55:00Z
6
value 0.00111
scoring_system epss
scoring_elements 0.29452
published_at 2026-04-07T12:55:00Z
7
value 0.00111
scoring_system epss
scoring_elements 0.29555
published_at 2026-04-09T12:55:00Z
8
value 0.00111
scoring_system epss
scoring_elements 0.2946
published_at 2026-04-13T12:55:00Z
9
value 0.00111
scoring_system epss
scoring_elements 0.29512
published_at 2026-04-12T12:55:00Z
10
value 0.00111
scoring_system epss
scoring_elements 0.29557
published_at 2026-04-11T12:55:00Z
11
value 0.00111
scoring_system epss
scoring_elements 0.29177
published_at 2026-04-26T12:55:00Z
12
value 0.00111
scoring_system epss
scoring_elements 0.29289
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1933
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1933
4
reference_url https://github.com/advisories/GHSA-r854-96gq-rfg3
reference_id
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r854-96gq-rfg3
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-23.yaml
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2014-23.yaml
6
reference_url https://github.com/python-imaging/Pillow
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-imaging/Pillow
7
reference_url https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-imaging/Pillow/commit/4e9f367dfd3f04c8f5d23f7f759ec12782e10ee7
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-1933
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2014-1933
9
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
10
reference_url http://www.openwall.com/lists/oss-security/2014/02/10/15
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/10/15
11
reference_url http://www.openwall.com/lists/oss-security/2014/02/11/1
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2014/02/11/1
12
reference_url http://www.securityfocus.com/bid/65513
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/65513
13
reference_url http://www.ubuntu.com/usn/USN-2168-1
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 5.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.ubuntu.com/usn/USN-2168-1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1063660
reference_id 1063660
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1063660
15
reference_url https://usn.ubuntu.com/2168-1/
reference_id USN-2168-1
reference_type
scores
url https://usn.ubuntu.com/2168-1/
fixed_packages
0
url pkg:deb/debian/pillow@2.4.0-1?distro=trixie
purl pkg:deb/debian/pillow@2.4.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@2.4.0-1%3Fdistro=trixie
1
url pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@8.1.2%252Bdfsg-0.3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@9.4.0-1.1%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@11.1.0-5%252Bdeb13u1%3Fdistro=trixie
4
url pkg:deb/debian/pillow@12.1.1-2?distro=trixie
purl pkg:deb/debian/pillow@12.1.1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.1.1-2%3Fdistro=trixie
5
url pkg:deb/debian/pillow@12.2.0-1?distro=trixie
purl pkg:deb/debian/pillow@12.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.2.0-1%3Fdistro=trixie
aliases CVE-2014-1933, GHSA-r854-96gq-rfg3, PYSEC-2014-23
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ptk9-u246-q7gh
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@2.4.0-1%3Fdistro=trixie