Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/pillow@0
Typepypi
Namespace
Namepillow
Version0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version12.1.1
Latest_non_vulnerable_version12.2.0
Affected_by_vulnerabilities
0
url VCID-avx2-mahw-mqes
vulnerability_id VCID-avx2-mahw-mqes
summary Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4009.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4009.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4009
reference_id
reference_type
scores
0
value 0.05263
scoring_system epss
scoring_elements 0.89986
published_at 2026-04-08T12:55:00Z
1
value 0.05263
scoring_system epss
scoring_elements 0.89948
published_at 2026-04-01T12:55:00Z
2
value 0.05263
scoring_system epss
scoring_elements 0.90047
published_at 2026-05-07T12:55:00Z
3
value 0.05263
scoring_system epss
scoring_elements 0.90033
published_at 2026-05-05T12:55:00Z
4
value 0.05263
scoring_system epss
scoring_elements 0.90021
published_at 2026-04-29T12:55:00Z
5
value 0.05263
scoring_system epss
scoring_elements 0.90003
published_at 2026-04-21T12:55:00Z
6
value 0.05263
scoring_system epss
scoring_elements 0.90006
published_at 2026-04-18T12:55:00Z
7
value 0.05263
scoring_system epss
scoring_elements 0.90005
published_at 2026-04-16T12:55:00Z
8
value 0.05263
scoring_system epss
scoring_elements 0.8999
published_at 2026-04-13T12:55:00Z
9
value 0.05263
scoring_system epss
scoring_elements 0.89997
published_at 2026-04-12T12:55:00Z
10
value 0.05263
scoring_system epss
scoring_elements 0.89998
published_at 2026-04-11T12:55:00Z
11
value 0.05263
scoring_system epss
scoring_elements 0.8997
published_at 2026-04-07T12:55:00Z
12
value 0.05263
scoring_system epss
scoring_elements 0.89991
published_at 2026-04-09T12:55:00Z
13
value 0.05263
scoring_system epss
scoring_elements 0.8995
published_at 2026-04-02T12:55:00Z
14
value 0.05263
scoring_system epss
scoring_elements 0.89963
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4009
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4009
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-hvr8-466p-75rh
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-hvr8-466p-75rh
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-7.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-7.yaml
6
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
7
reference_url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
8
reference_url https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/4e0d9b0b9740d258ade40cce248c93777362ac1e
9
reference_url https://github.com/python-pillow/Pillow/pull/1714
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/1714
10
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
11
reference_url http://www.securityfocus.com/bid/86064
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/86064
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1327134
reference_id 1327134
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1327134
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-4009
reference_id CVE-2016-4009
reference_type
scores
0
value 10.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:C/I:C/A:C
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
4
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-4009
fixed_packages
0
url pkg:pypi/pillow@3.1.1
purl pkg:pypi/pillow@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-8n2b-wvya-53e1
9
vulnerability VCID-9ckw-ra54-z3b7
10
vulnerability VCID-and9-6jty-pyeq
11
vulnerability VCID-aubw-tsmn-ffcq
12
vulnerability VCID-b3au-rcgp-2fag
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-cas2-jb3y-vyhz
16
vulnerability VCID-d7uf-zdbv-sba1
17
vulnerability VCID-df4x-jt3h-17hx
18
vulnerability VCID-dpc3-td9q-dyee
19
vulnerability VCID-e3gp-zc2b-budg
20
vulnerability VCID-en6t-uxtq-bfek
21
vulnerability VCID-g46h-p8jk-cuhc
22
vulnerability VCID-gvjw-funa-sqak
23
vulnerability VCID-h4x7-7fke-mqgp
24
vulnerability VCID-haum-8zpg-6kgf
25
vulnerability VCID-hmmq-5772-bycm
26
vulnerability VCID-khp6-9hfx-1kge
27
vulnerability VCID-m3tm-h4q9-9yay
28
vulnerability VCID-n1hp-atex-ubh4
29
vulnerability VCID-n1w5-f5p7-xuhb
30
vulnerability VCID-p6r3-puh1-zyg6
31
vulnerability VCID-q4bb-qnxe-8bfa
32
vulnerability VCID-rncf-9nf8-wud3
33
vulnerability VCID-sns1-ksqr-vbhr
34
vulnerability VCID-stft-hsk9-zfdy
35
vulnerability VCID-u1en-t8ux-uube
36
vulnerability VCID-ue18-zzau-x7hy
37
vulnerability VCID-uf5t-asns-tudp
38
vulnerability VCID-vdzj-kqfy-d3b7
39
vulnerability VCID-vwbu-ruxm-tbh4
40
vulnerability VCID-vxh1-8rvt-kkak
41
vulnerability VCID-vyzt-df2u-h3cc
42
vulnerability VCID-w9uy-fnpm-cbak
43
vulnerability VCID-x15z-dejc-9ba6
44
vulnerability VCID-xesd-d294-7fcx
45
vulnerability VCID-xk66-1d31-2qbk
46
vulnerability VCID-yccg-zw89-vqff
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1
aliases CVE-2016-4009, GHSA-hvr8-466p-75rh, PYSEC-2016-7
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-avx2-mahw-mqes
1
url VCID-b3au-rcgp-2fag
vulnerability_id VCID-b3au-rcgp-2fag
summary There is a DoS vulnerability in Pillow before 6.2.2 caused by FpxImagePlugin.py calling the range function on an unvalidated 32-bit integer if the number of bands is large. On Windows running 32-bit Python, this results in an OverflowError or MemoryError due to the 2 GB limit. However, on Linux running 64-bit Python this results in the process being terminated by the OOM killer.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19911.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-19911.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-19911
reference_id
reference_type
scores
0
value 0.00965
scoring_system epss
scoring_elements 0.76666
published_at 2026-05-07T12:55:00Z
1
value 0.00965
scoring_system epss
scoring_elements 0.76648
published_at 2026-04-29T12:55:00Z
2
value 0.00965
scoring_system epss
scoring_elements 0.76506
published_at 2026-04-01T12:55:00Z
3
value 0.00965
scoring_system epss
scoring_elements 0.76635
published_at 2026-05-05T12:55:00Z
4
value 0.00965
scoring_system epss
scoring_elements 0.7663
published_at 2026-04-24T12:55:00Z
5
value 0.00965
scoring_system epss
scoring_elements 0.76597
published_at 2026-04-21T12:55:00Z
6
value 0.00965
scoring_system epss
scoring_elements 0.76609
published_at 2026-04-18T12:55:00Z
7
value 0.00965
scoring_system epss
scoring_elements 0.76606
published_at 2026-04-16T12:55:00Z
8
value 0.00965
scoring_system epss
scoring_elements 0.76564
published_at 2026-04-13T12:55:00Z
9
value 0.00965
scoring_system epss
scoring_elements 0.76571
published_at 2026-04-12T12:55:00Z
10
value 0.00965
scoring_system epss
scoring_elements 0.76592
published_at 2026-04-11T12:55:00Z
11
value 0.00965
scoring_system epss
scoring_elements 0.76565
published_at 2026-04-09T12:55:00Z
12
value 0.00965
scoring_system epss
scoring_elements 0.76554
published_at 2026-04-08T12:55:00Z
13
value 0.00965
scoring_system epss
scoring_elements 0.76522
published_at 2026-04-07T12:55:00Z
14
value 0.00965
scoring_system epss
scoring_elements 0.7654
published_at 2026-04-04T12:55:00Z
15
value 0.00965
scoring_system epss
scoring_elements 0.76511
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-19911
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19911
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5312
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/advisories/GHSA-5gm3-px64-rw72
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-5gm3-px64-rw72
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-172.yaml
8
reference_url https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/blob/master/CHANGES.rst#622-2020-01-02
9
reference_url https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/774e53bb132461d8d5ebefec1162e29ec0ebc63d
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-19911
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2019-19911
13
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
14
reference_url https://usn.ubuntu.com/4272-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4272-1
15
reference_url https://usn.ubuntu.com/4272-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/4272-1/
16
reference_url https://www.debian.org/security/2020/dsa-4631
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.debian.org/security/2020/dsa-4631
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789540
reference_id 1789540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789540
18
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224
reference_id 948224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224
19
reference_url https://access.redhat.com/errata/RHSA-2021:0420
reference_id RHSA-2021:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0420
fixed_packages
0
url pkg:pypi/pillow@6.2.2
purl pkg:pypi/pillow@6.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-7bjx-gkf7-cke9
9
vulnerability VCID-8n2b-wvya-53e1
10
vulnerability VCID-9ckw-ra54-z3b7
11
vulnerability VCID-and9-6jty-pyeq
12
vulnerability VCID-aubw-tsmn-ffcq
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-d7uf-zdbv-sba1
16
vulnerability VCID-df4x-jt3h-17hx
17
vulnerability VCID-dpc3-td9q-dyee
18
vulnerability VCID-en6t-uxtq-bfek
19
vulnerability VCID-g46h-p8jk-cuhc
20
vulnerability VCID-gvjw-funa-sqak
21
vulnerability VCID-haum-8zpg-6kgf
22
vulnerability VCID-khp6-9hfx-1kge
23
vulnerability VCID-n1hp-atex-ubh4
24
vulnerability VCID-n1w5-f5p7-xuhb
25
vulnerability VCID-p6r3-puh1-zyg6
26
vulnerability VCID-q4bb-qnxe-8bfa
27
vulnerability VCID-rncf-9nf8-wud3
28
vulnerability VCID-ue18-zzau-x7hy
29
vulnerability VCID-uf5t-asns-tudp
30
vulnerability VCID-vdzj-kqfy-d3b7
31
vulnerability VCID-vwbu-ruxm-tbh4
32
vulnerability VCID-vxh1-8rvt-kkak
33
vulnerability VCID-vyzt-df2u-h3cc
34
vulnerability VCID-w9uy-fnpm-cbak
35
vulnerability VCID-x15z-dejc-9ba6
36
vulnerability VCID-xesd-d294-7fcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@6.2.2
aliases CVE-2019-19911, GHSA-5gm3-px64-rw72, PYSEC-2020-172
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3au-rcgp-2fag
2
url VCID-dgds-v95g-pbcv
vulnerability_id VCID-dgds-v95g-pbcv
summary Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0740.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-0740.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-0740
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35005
published_at 2026-04-18T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.3502
published_at 2026-04-16T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.34565
published_at 2026-05-07T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.34493
published_at 2026-05-05T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34621
published_at 2026-04-29T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.34712
published_at 2026-04-26T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.34732
published_at 2026-04-24T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.3496
published_at 2026-04-21T12:55:00Z
8
value 0.00148
scoring_system epss
scoring_elements 0.35207
published_at 2026-04-07T12:55:00Z
9
value 0.00148
scoring_system epss
scoring_elements 0.35221
published_at 2026-04-13T12:55:00Z
10
value 0.00148
scoring_system epss
scoring_elements 0.35245
published_at 2026-04-12T12:55:00Z
11
value 0.00148
scoring_system epss
scoring_elements 0.3528
published_at 2026-04-11T12:55:00Z
12
value 0.00148
scoring_system epss
scoring_elements 0.35096
published_at 2026-04-01T12:55:00Z
13
value 0.00148
scoring_system epss
scoring_elements 0.35277
published_at 2026-04-09T12:55:00Z
14
value 0.00148
scoring_system epss
scoring_elements 0.35252
published_at 2026-04-08T12:55:00Z
15
value 0.00148
scoring_system epss
scoring_elements 0.35296
published_at 2026-04-02T12:55:00Z
16
value 0.00148
scoring_system epss
scoring_elements 0.35325
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-0740
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/advisories/GHSA-hggx-3h72-49ww
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-hggx-3h72-49ww
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-5.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-5.yaml
8
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
9
reference_url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
10
reference_url https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/6dcbf5bd96b717c58d7b642949da8d323099928e
11
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
12
reference_url http://www.debian.org/security/2016/dsa-3499
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2016/dsa-3499
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1298874
reference_id 1298874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1298874
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813905
reference_id 813905
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813905
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-0740
reference_id CVE-2016-0740
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
3
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
4
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-0740
19
reference_url https://usn.ubuntu.com/3090-1/
reference_id USN-3090-1
reference_type
scores
url https://usn.ubuntu.com/3090-1/
fixed_packages
0
url pkg:pypi/pillow@3.1.1
purl pkg:pypi/pillow@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-8n2b-wvya-53e1
9
vulnerability VCID-9ckw-ra54-z3b7
10
vulnerability VCID-and9-6jty-pyeq
11
vulnerability VCID-aubw-tsmn-ffcq
12
vulnerability VCID-b3au-rcgp-2fag
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-cas2-jb3y-vyhz
16
vulnerability VCID-d7uf-zdbv-sba1
17
vulnerability VCID-df4x-jt3h-17hx
18
vulnerability VCID-dpc3-td9q-dyee
19
vulnerability VCID-e3gp-zc2b-budg
20
vulnerability VCID-en6t-uxtq-bfek
21
vulnerability VCID-g46h-p8jk-cuhc
22
vulnerability VCID-gvjw-funa-sqak
23
vulnerability VCID-h4x7-7fke-mqgp
24
vulnerability VCID-haum-8zpg-6kgf
25
vulnerability VCID-hmmq-5772-bycm
26
vulnerability VCID-khp6-9hfx-1kge
27
vulnerability VCID-m3tm-h4q9-9yay
28
vulnerability VCID-n1hp-atex-ubh4
29
vulnerability VCID-n1w5-f5p7-xuhb
30
vulnerability VCID-p6r3-puh1-zyg6
31
vulnerability VCID-q4bb-qnxe-8bfa
32
vulnerability VCID-rncf-9nf8-wud3
33
vulnerability VCID-sns1-ksqr-vbhr
34
vulnerability VCID-stft-hsk9-zfdy
35
vulnerability VCID-u1en-t8ux-uube
36
vulnerability VCID-ue18-zzau-x7hy
37
vulnerability VCID-uf5t-asns-tudp
38
vulnerability VCID-vdzj-kqfy-d3b7
39
vulnerability VCID-vwbu-ruxm-tbh4
40
vulnerability VCID-vxh1-8rvt-kkak
41
vulnerability VCID-vyzt-df2u-h3cc
42
vulnerability VCID-w9uy-fnpm-cbak
43
vulnerability VCID-x15z-dejc-9ba6
44
vulnerability VCID-xesd-d294-7fcx
45
vulnerability VCID-xk66-1d31-2qbk
46
vulnerability VCID-yccg-zw89-vqff
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1
aliases CVE-2016-0740, GHSA-hggx-3h72-49ww, PYSEC-2016-5
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dgds-v95g-pbcv
3
url VCID-e3gp-zc2b-budg
vulnerability_id VCID-e3gp-zc2b-budg
summary Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
references
0
reference_url http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://pillow.readthedocs.io/en/3.4.x/releasenotes/3.3.2.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9189.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9189.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9189
reference_id
reference_type
scores
0
value 0.00358
scoring_system epss
scoring_elements 0.57999
published_at 2026-04-24T12:55:00Z
1
value 0.00358
scoring_system epss
scoring_elements 0.58033
published_at 2026-04-21T12:55:00Z
2
value 0.00358
scoring_system epss
scoring_elements 0.58056
published_at 2026-04-18T12:55:00Z
3
value 0.00358
scoring_system epss
scoring_elements 0.58025
published_at 2026-04-13T12:55:00Z
4
value 0.00358
scoring_system epss
scoring_elements 0.58046
published_at 2026-04-12T12:55:00Z
5
value 0.00358
scoring_system epss
scoring_elements 0.58069
published_at 2026-04-11T12:55:00Z
6
value 0.00358
scoring_system epss
scoring_elements 0.58053
published_at 2026-04-09T12:55:00Z
7
value 0.00358
scoring_system epss
scoring_elements 0.57913
published_at 2026-04-01T12:55:00Z
8
value 0.00358
scoring_system epss
scoring_elements 0.57998
published_at 2026-04-02T12:55:00Z
9
value 0.00358
scoring_system epss
scoring_elements 0.5802
published_at 2026-04-04T12:55:00Z
10
value 0.00358
scoring_system epss
scoring_elements 0.57953
published_at 2026-05-05T12:55:00Z
11
value 0.00358
scoring_system epss
scoring_elements 0.57996
published_at 2026-05-07T12:55:00Z
12
value 0.00358
scoring_system epss
scoring_elements 0.58013
published_at 2026-04-26T12:55:00Z
13
value 0.00358
scoring_system epss
scoring_elements 0.58049
published_at 2026-04-08T12:55:00Z
14
value 0.00358
scoring_system epss
scoring_elements 0.57994
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9189
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9189
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9190
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9190
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/advisories/GHSA-rwr3-c2q8-gm56
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
3
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-rwr3-c2q8-gm56
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-8.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-8.yaml
8
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
9
reference_url https://github.com/python-pillow/Pillow/issues/2105
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/issues/2105
10
reference_url https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/2146/commits/c50ebe6459a131a1ea8ca531f10da616d3ceaa0f
11
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
12
reference_url http://www.debian.org/security/2016/dsa-3710
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2016/dsa-3710
13
reference_url http://www.securityfocus.com/bid/94234
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/94234
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1382000
reference_id 1382000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1382000
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-9189
reference_id CVE-2016-9189
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-9189
16
reference_url https://usn.ubuntu.com/3229-1/
reference_id USN-3229-1
reference_type
scores
url https://usn.ubuntu.com/3229-1/
17
reference_url https://usn.ubuntu.com/3230-1/
reference_id USN-3230-1
reference_type
scores
url https://usn.ubuntu.com/3230-1/
fixed_packages
0
url pkg:pypi/pillow@3.3.2
purl pkg:pypi/pillow@3.3.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-8n2b-wvya-53e1
9
vulnerability VCID-9ckw-ra54-z3b7
10
vulnerability VCID-and9-6jty-pyeq
11
vulnerability VCID-aubw-tsmn-ffcq
12
vulnerability VCID-b3au-rcgp-2fag
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-cas2-jb3y-vyhz
16
vulnerability VCID-d7uf-zdbv-sba1
17
vulnerability VCID-df4x-jt3h-17hx
18
vulnerability VCID-dpc3-td9q-dyee
19
vulnerability VCID-en6t-uxtq-bfek
20
vulnerability VCID-g46h-p8jk-cuhc
21
vulnerability VCID-gvjw-funa-sqak
22
vulnerability VCID-h4x7-7fke-mqgp
23
vulnerability VCID-haum-8zpg-6kgf
24
vulnerability VCID-hmmq-5772-bycm
25
vulnerability VCID-khp6-9hfx-1kge
26
vulnerability VCID-m3tm-h4q9-9yay
27
vulnerability VCID-n1hp-atex-ubh4
28
vulnerability VCID-n1w5-f5p7-xuhb
29
vulnerability VCID-p6r3-puh1-zyg6
30
vulnerability VCID-q4bb-qnxe-8bfa
31
vulnerability VCID-rncf-9nf8-wud3
32
vulnerability VCID-sns1-ksqr-vbhr
33
vulnerability VCID-stft-hsk9-zfdy
34
vulnerability VCID-ue18-zzau-x7hy
35
vulnerability VCID-uf5t-asns-tudp
36
vulnerability VCID-vdzj-kqfy-d3b7
37
vulnerability VCID-vwbu-ruxm-tbh4
38
vulnerability VCID-vxh1-8rvt-kkak
39
vulnerability VCID-vyzt-df2u-h3cc
40
vulnerability VCID-w9uy-fnpm-cbak
41
vulnerability VCID-x15z-dejc-9ba6
42
vulnerability VCID-xesd-d294-7fcx
43
vulnerability VCID-xk66-1d31-2qbk
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.3.2
aliases CVE-2016-9189, GHSA-rwr3-c2q8-gm56, PYSEC-2016-8
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e3gp-zc2b-budg
4
url VCID-en6t-uxtq-bfek
vulnerability_id VCID-en6t-uxtq-bfek
summary An issue was discovered in Pillow before 8.1.1. TiffDecode has a heap-based buffer overflow when decoding crafted YCbCr files because of certain interpretation conflicts with LibTIFF in RGBA mode. NOTE: this issue exists because of an incomplete fix for CVE-2020-35654.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25289.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25289.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25289
reference_id
reference_type
scores
0
value 0.00206
scoring_system epss
scoring_elements 0.42926
published_at 2026-04-01T12:55:00Z
1
value 0.00206
scoring_system epss
scoring_elements 0.43036
published_at 2026-04-18T12:55:00Z
2
value 0.00206
scoring_system epss
scoring_elements 0.43048
published_at 2026-04-16T12:55:00Z
3
value 0.00206
scoring_system epss
scoring_elements 0.42988
published_at 2026-04-13T12:55:00Z
4
value 0.00206
scoring_system epss
scoring_elements 0.43005
published_at 2026-04-12T12:55:00Z
5
value 0.00206
scoring_system epss
scoring_elements 0.4304
published_at 2026-04-11T12:55:00Z
6
value 0.00206
scoring_system epss
scoring_elements 0.43017
published_at 2026-04-09T12:55:00Z
7
value 0.00206
scoring_system epss
scoring_elements 0.43004
published_at 2026-04-08T12:55:00Z
8
value 0.00206
scoring_system epss
scoring_elements 0.42954
published_at 2026-04-07T12:55:00Z
9
value 0.00206
scoring_system epss
scoring_elements 0.43018
published_at 2026-04-04T12:55:00Z
10
value 0.00206
scoring_system epss
scoring_elements 0.4299
published_at 2026-04-02T12:55:00Z
11
value 0.00762
scoring_system epss
scoring_elements 0.73401
published_at 2026-04-21T12:55:00Z
12
value 0.00762
scoring_system epss
scoring_elements 0.73465
published_at 2026-05-07T12:55:00Z
13
value 0.0083
scoring_system epss
scoring_elements 0.7461
published_at 2026-05-05T12:55:00Z
14
value 0.0083
scoring_system epss
scoring_elements 0.746
published_at 2026-04-24T12:55:00Z
15
value 0.0083
scoring_system epss
scoring_elements 0.74607
published_at 2026-04-29T12:55:00Z
16
value 0.0083
scoring_system epss
scoring_elements 0.74606
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25289
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25289
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-57h3-9rgr-c24m
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-57h3-9rgr-c24m
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-35.yaml
6
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
7
reference_url https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/3fee28eb9479bf7d59e0fa08068f9cc4a6e2f04c
8
reference_url https://github.com/python-pillow/Pillow/commit/cbfdde7b1f2295059a20a539ee9960f0bec7b299
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/cbfdde7b1f2295059a20a539ee9960f0bec7b299
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-25289
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-25289
10
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
11
reference_url https://security.gentoo.org/glsa/202107-33
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202107-33
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1934680
reference_id 1934680
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1934680
13
reference_url https://security.archlinux.org/AVG-1635
reference_id AVG-1635
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1635
14
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
15
reference_url https://usn.ubuntu.com/4763-1/
reference_id USN-4763-1
reference_type
scores
url https://usn.ubuntu.com/4763-1/
fixed_packages
0
url pkg:pypi/pillow@8.1.1
purl pkg:pypi/pillow@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-9ckw-ra54-z3b7
8
vulnerability VCID-aubw-tsmn-ffcq
9
vulnerability VCID-brp2-dtrf-jyfr
10
vulnerability VCID-d7uf-zdbv-sba1
11
vulnerability VCID-df4x-jt3h-17hx
12
vulnerability VCID-dpc3-td9q-dyee
13
vulnerability VCID-g46h-p8jk-cuhc
14
vulnerability VCID-gvjw-funa-sqak
15
vulnerability VCID-n1hp-atex-ubh4
16
vulnerability VCID-n1w5-f5p7-xuhb
17
vulnerability VCID-q4bb-qnxe-8bfa
18
vulnerability VCID-ue18-zzau-x7hy
19
vulnerability VCID-vdzj-kqfy-d3b7
20
vulnerability VCID-vwbu-ruxm-tbh4
21
vulnerability VCID-vyzt-df2u-h3cc
22
vulnerability VCID-w9uy-fnpm-cbak
23
vulnerability VCID-xesd-d294-7fcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.1
aliases BIT-pillow-2021-25289, CVE-2021-25289, GHSA-57h3-9rgr-c24m, PYSEC-2021-35
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-en6t-uxtq-bfek
5
url VCID-n1hp-atex-ubh4
vulnerability_id VCID-n1hp-atex-ubh4
summary An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44271.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-44271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-44271
reference_id
reference_type
scores
0
value 0.00218
scoring_system epss
scoring_elements 0.44406
published_at 2026-04-09T12:55:00Z
1
value 0.00218
scoring_system epss
scoring_elements 0.44391
published_at 2026-04-13T12:55:00Z
2
value 0.00218
scoring_system epss
scoring_elements 0.44413
published_at 2026-04-04T12:55:00Z
3
value 0.00218
scoring_system epss
scoring_elements 0.44347
published_at 2026-04-07T12:55:00Z
4
value 0.00218
scoring_system epss
scoring_elements 0.44423
published_at 2026-04-11T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44399
published_at 2026-04-08T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44183
published_at 2026-04-29T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44266
published_at 2026-04-26T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44263
published_at 2026-04-24T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44438
published_at 2026-04-18T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44447
published_at 2026-04-16T12:55:00Z
11
value 0.00218
scoring_system epss
scoring_elements 0.44392
published_at 2026-04-12T12:55:00Z
12
value 0.00224
scoring_system epss
scoring_elements 0.45083
published_at 2026-04-21T12:55:00Z
13
value 0.00236
scoring_system epss
scoring_elements 0.46434
published_at 2026-05-05T12:55:00Z
14
value 0.00236
scoring_system epss
scoring_elements 0.46499
published_at 2026-05-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-44271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28219
5
reference_url https://devhub.checkmarx.com/cve-details/CVE-2023-44271/
reference_id
reference_type
scores
url https://devhub.checkmarx.com/cve-details/CVE-2023-44271/
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2023-227.yaml
8
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
9
reference_url https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/1fe1bb49c452b0318cad12ea9d97c3bef188e9a7
10
reference_url https://github.com/python-pillow/Pillow/pull/7244
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/7244
11
reference_url https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2024/03/msg00021.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N2JOEDUJDQLCUII2LQYZYSM7RJL2I3P4
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2247820
reference_id 2247820
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2247820
14
reference_url https://devhub.checkmarx.com/cve-details/CVE-2023-44271
reference_id CVE-2023-44271
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://devhub.checkmarx.com/cve-details/CVE-2023-44271
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-44271
reference_id CVE-2023-44271
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-44271
16
reference_url https://github.com/advisories/GHSA-8ghj-p4vj-mr35
reference_id GHSA-8ghj-p4vj-mr35
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8ghj-p4vj-mr35
17
reference_url https://security.gentoo.org/glsa/202405-12
reference_id GLSA-202405-12
reference_type
scores
url https://security.gentoo.org/glsa/202405-12
18
reference_url https://access.redhat.com/errata/RHSA-2024:0345
reference_id RHSA-2024:0345
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0345
19
reference_url https://access.redhat.com/errata/RHSA-2024:1057
reference_id RHSA-2024:1057
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1057
20
reference_url https://access.redhat.com/errata/RHSA-2024:3005
reference_id RHSA-2024:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:3005
21
reference_url https://usn.ubuntu.com/6618-1/
reference_id USN-6618-1
reference_type
scores
url https://usn.ubuntu.com/6618-1/
22
reference_url https://usn.ubuntu.com/8135-1/
reference_id USN-8135-1
reference_type
scores
url https://usn.ubuntu.com/8135-1/
fixed_packages
0
url pkg:pypi/pillow@10.0.0
purl pkg:pypi/pillow@10.0.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5rv4-k1q9-zue2
1
vulnerability VCID-64n5-pugj-vue8
2
vulnerability VCID-9ckw-ra54-z3b7
3
vulnerability VCID-d7uf-zdbv-sba1
4
vulnerability VCID-vdzj-kqfy-d3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@10.0.0
aliases BIT-pillow-2023-44271, CVE-2023-44271, GHSA-8ghj-p4vj-mr35, PYSEC-2023-227
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n1hp-atex-ubh4
6
url VCID-rncf-9nf8-wud3
vulnerability_id VCID-rncf-9nf8-wud3
summary An issue was discovered in Pillow before 8.1.1. In TiffDecode.c, there is a negative-offset memcpy with an invalid size.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25290.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-25290.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-25290
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-09T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34596
published_at 2026-04-16T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34558
published_at 2026-04-13T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34582
published_at 2026-04-18T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34621
published_at 2026-04-11T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34591
published_at 2026-04-08T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34548
published_at 2026-04-07T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-04T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.34653
published_at 2026-04-02T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34335
published_at 2026-04-01T12:55:00Z
10
value 0.0024
scoring_system epss
scoring_elements 0.4721
published_at 2026-05-07T12:55:00Z
11
value 0.0024
scoring_system epss
scoring_elements 0.47146
published_at 2026-05-05T12:55:00Z
12
value 0.0024
scoring_system epss
scoring_elements 0.4723
published_at 2026-04-29T12:55:00Z
13
value 0.0024
scoring_system epss
scoring_elements 0.47283
published_at 2026-04-26T12:55:00Z
14
value 0.0024
scoring_system epss
scoring_elements 0.47273
published_at 2026-04-24T12:55:00Z
15
value 0.00247
scoring_system epss
scoring_elements 0.47959
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-25290
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25290
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-8xjq-8fcg-g5hw
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-8xjq-8fcg-g5hw
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-36.yaml
6
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
7
reference_url https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/86f02f7c70862a0954bfe8133736d352db978eaa
8
reference_url https://github.com/python-pillow/Pillow/commit/e25be1e33dc526bfd1094bc778a54d8e29bf66c9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/e25be1e33dc526bfd1094bc778a54d8e29bf66c9
9
reference_url https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-25290
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-25290
11
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/8.1.1.html
12
reference_url https://security.gentoo.org/glsa/202107-33
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202107-33
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1934685
reference_id 1934685
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1934685
14
reference_url https://security.archlinux.org/AVG-1635
reference_id AVG-1635
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1635
15
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
16
reference_url https://access.redhat.com/errata/RHSA-2021:4149
reference_id RHSA-2021:4149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4149
17
reference_url https://usn.ubuntu.com/4763-1/
reference_id USN-4763-1
reference_type
scores
url https://usn.ubuntu.com/4763-1/
18
reference_url https://usn.ubuntu.com/8135-1/
reference_id USN-8135-1
reference_type
scores
url https://usn.ubuntu.com/8135-1/
fixed_packages
0
url pkg:pypi/pillow@8.1.1
purl pkg:pypi/pillow@8.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-9ckw-ra54-z3b7
8
vulnerability VCID-aubw-tsmn-ffcq
9
vulnerability VCID-brp2-dtrf-jyfr
10
vulnerability VCID-d7uf-zdbv-sba1
11
vulnerability VCID-df4x-jt3h-17hx
12
vulnerability VCID-dpc3-td9q-dyee
13
vulnerability VCID-g46h-p8jk-cuhc
14
vulnerability VCID-gvjw-funa-sqak
15
vulnerability VCID-n1hp-atex-ubh4
16
vulnerability VCID-n1w5-f5p7-xuhb
17
vulnerability VCID-q4bb-qnxe-8bfa
18
vulnerability VCID-ue18-zzau-x7hy
19
vulnerability VCID-vdzj-kqfy-d3b7
20
vulnerability VCID-vwbu-ruxm-tbh4
21
vulnerability VCID-vyzt-df2u-h3cc
22
vulnerability VCID-w9uy-fnpm-cbak
23
vulnerability VCID-xesd-d294-7fcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.1
aliases BIT-pillow-2021-25290, CVE-2021-25290, GHSA-8xjq-8fcg-g5hw, PYSEC-2021-36
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rncf-9nf8-wud3
7
url VCID-stft-hsk9-zfdy
vulnerability_id VCID-stft-hsk9-zfdy
summary libImaging/TiffDecode.c in Pillow before 6.2.2 has a TIFF decoding integer overflow, related to realloc.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-5310.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-5310
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.69912
published_at 2026-05-07T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.69867
published_at 2026-05-05T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69893
published_at 2026-04-29T12:55:00Z
3
value 0.00611
scoring_system epss
scoring_elements 0.69889
published_at 2026-04-26T12:55:00Z
4
value 0.00611
scoring_system epss
scoring_elements 0.6988
published_at 2026-04-24T12:55:00Z
5
value 0.00611
scoring_system epss
scoring_elements 0.69829
published_at 2026-04-21T12:55:00Z
6
value 0.00611
scoring_system epss
scoring_elements 0.69848
published_at 2026-04-18T12:55:00Z
7
value 0.00611
scoring_system epss
scoring_elements 0.69838
published_at 2026-04-16T12:55:00Z
8
value 0.00611
scoring_system epss
scoring_elements 0.69796
published_at 2026-04-13T12:55:00Z
9
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-12T12:55:00Z
10
value 0.00611
scoring_system epss
scoring_elements 0.69825
published_at 2026-04-11T12:55:00Z
11
value 0.00611
scoring_system epss
scoring_elements 0.69802
published_at 2026-04-09T12:55:00Z
12
value 0.00611
scoring_system epss
scoring_elements 0.69786
published_at 2026-04-08T12:55:00Z
13
value 0.00611
scoring_system epss
scoring_elements 0.69738
published_at 2026-04-07T12:55:00Z
14
value 0.00611
scoring_system epss
scoring_elements 0.69761
published_at 2026-04-04T12:55:00Z
15
value 0.00611
scoring_system epss
scoring_elements 0.69745
published_at 2026-04-02T12:55:00Z
16
value 0.00611
scoring_system epss
scoring_elements 0.69734
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-5310
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5310
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-vcqg-3p29-xw73
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-vcqg-3p29-xw73
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2020-81.yaml
6
reference_url https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-db/blob/7872b0a91b4d980f749e6d75a81f8cc1af32829f/vulns/pillow/PYSEC-2020-81.yaml
7
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
8
reference_url https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/4e2def2539ec13e53a82e06c4b3daf00454100c4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MMU3WT2X64GS5WHDPKKC2WZA7UIIQ3A/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3DUMIBUYGJRAVJCTFUWBRLVQKOUTVX5P/
13
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/6.2.2.html
14
reference_url https://usn.ubuntu.com/4272-1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/4272-1
15
reference_url https://usn.ubuntu.com/4272-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/4272-1/
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1789538
reference_id 1789538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1789538
17
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224
reference_id 948224
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=948224
18
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-5310
reference_id CVE-2020-5310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-5310
19
reference_url https://access.redhat.com/errata/RHSA-2021:0420
reference_id RHSA-2021:0420
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0420
fixed_packages
0
url pkg:pypi/pillow@6.2.2
purl pkg:pypi/pillow@6.2.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-7bjx-gkf7-cke9
9
vulnerability VCID-8n2b-wvya-53e1
10
vulnerability VCID-9ckw-ra54-z3b7
11
vulnerability VCID-and9-6jty-pyeq
12
vulnerability VCID-aubw-tsmn-ffcq
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-d7uf-zdbv-sba1
16
vulnerability VCID-df4x-jt3h-17hx
17
vulnerability VCID-dpc3-td9q-dyee
18
vulnerability VCID-en6t-uxtq-bfek
19
vulnerability VCID-g46h-p8jk-cuhc
20
vulnerability VCID-gvjw-funa-sqak
21
vulnerability VCID-haum-8zpg-6kgf
22
vulnerability VCID-khp6-9hfx-1kge
23
vulnerability VCID-n1hp-atex-ubh4
24
vulnerability VCID-n1w5-f5p7-xuhb
25
vulnerability VCID-p6r3-puh1-zyg6
26
vulnerability VCID-q4bb-qnxe-8bfa
27
vulnerability VCID-rncf-9nf8-wud3
28
vulnerability VCID-ue18-zzau-x7hy
29
vulnerability VCID-uf5t-asns-tudp
30
vulnerability VCID-vdzj-kqfy-d3b7
31
vulnerability VCID-vwbu-ruxm-tbh4
32
vulnerability VCID-vxh1-8rvt-kkak
33
vulnerability VCID-vyzt-df2u-h3cc
34
vulnerability VCID-w9uy-fnpm-cbak
35
vulnerability VCID-x15z-dejc-9ba6
36
vulnerability VCID-xesd-d294-7fcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@6.2.2
aliases BIT-pillow-2020-5310, CVE-2020-5310, GHSA-vcqg-3p29-xw73, PYSEC-2020-81
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stft-hsk9-zfdy
8
url VCID-x15z-dejc-9ba6
vulnerability_id VCID-x15z-dejc-9ba6
summary In Pillow before 8.1.0, PcxDecode has a buffer over-read when decoding a crafted PCX file because the user-supplied stride value is trusted for buffer calculations.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35653.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-35653.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-35653
reference_id
reference_type
scores
0
value 0.00293
scoring_system epss
scoring_elements 0.52536
published_at 2026-04-01T12:55:00Z
1
value 0.00293
scoring_system epss
scoring_elements 0.52684
published_at 2026-04-18T12:55:00Z
2
value 0.00293
scoring_system epss
scoring_elements 0.52676
published_at 2026-04-16T12:55:00Z
3
value 0.00293
scoring_system epss
scoring_elements 0.52639
published_at 2026-04-13T12:55:00Z
4
value 0.00293
scoring_system epss
scoring_elements 0.52654
published_at 2026-04-12T12:55:00Z
5
value 0.00293
scoring_system epss
scoring_elements 0.52671
published_at 2026-04-11T12:55:00Z
6
value 0.00293
scoring_system epss
scoring_elements 0.5262
published_at 2026-04-09T12:55:00Z
7
value 0.00293
scoring_system epss
scoring_elements 0.52626
published_at 2026-04-08T12:55:00Z
8
value 0.00293
scoring_system epss
scoring_elements 0.52575
published_at 2026-04-07T12:55:00Z
9
value 0.00293
scoring_system epss
scoring_elements 0.52608
published_at 2026-04-04T12:55:00Z
10
value 0.00293
scoring_system epss
scoring_elements 0.52581
published_at 2026-04-02T12:55:00Z
11
value 0.00293
scoring_system epss
scoring_elements 0.52587
published_at 2026-05-07T12:55:00Z
12
value 0.00293
scoring_system epss
scoring_elements 0.52534
published_at 2026-05-05T12:55:00Z
13
value 0.00293
scoring_system epss
scoring_elements 0.52592
published_at 2026-04-29T12:55:00Z
14
value 0.00293
scoring_system epss
scoring_elements 0.52629
published_at 2026-04-26T12:55:00Z
15
value 0.00293
scoring_system epss
scoring_elements 0.52619
published_at 2026-04-24T12:55:00Z
16
value 0.00293
scoring_system epss
scoring_elements 0.52668
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-35653
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35653
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-f5g8-5qq7-938w
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-f5g8-5qq7-938w
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2021-69.yaml
6
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
7
reference_url https://github.com/python-pillow/Pillow/commit/2f409261eb1228e166868f8f0b5da5cda52e55bf
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/2f409261eb1228e166868f8f0b5da5cda52e55bf
8
reference_url https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2021/07/msg00018.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6BYVI5G44MRIPERKYDQEL3S3YQCZTVHE/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BF553AMNNNBW7SH4IM4MNE4M6GNZQ7YD/
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-35653
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-35653
14
reference_url https://pillow.readthedocs.io/en/stable/releasenotes/index.html
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H
1
value 8.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://pillow.readthedocs.io/en/stable/releasenotes/index.html
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1915420
reference_id 1915420
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1915420
16
reference_url https://security.archlinux.org/ASA-202101-11
reference_id ASA-202101-11
reference_type
scores
url https://security.archlinux.org/ASA-202101-11
17
reference_url https://security.archlinux.org/AVG-1438
reference_id AVG-1438
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1438
18
reference_url https://security.gentoo.org/glsa/202101-08
reference_id GLSA-202101-08
reference_type
scores
url https://security.gentoo.org/glsa/202101-08
19
reference_url https://access.redhat.com/errata/RHSA-2021:3917
reference_id RHSA-2021:3917
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:3917
20
reference_url https://access.redhat.com/errata/RHSA-2021:4149
reference_id RHSA-2021:4149
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4149
21
reference_url https://usn.ubuntu.com/4697-1/
reference_id USN-4697-1
reference_type
scores
url https://usn.ubuntu.com/4697-1/
22
reference_url https://usn.ubuntu.com/4697-2/
reference_id USN-4697-2
reference_type
scores
url https://usn.ubuntu.com/4697-2/
fixed_packages
0
url pkg:pypi/pillow@8.1.0
purl pkg:pypi/pillow@8.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-9ckw-ra54-z3b7
8
vulnerability VCID-aubw-tsmn-ffcq
9
vulnerability VCID-brp2-dtrf-jyfr
10
vulnerability VCID-d7uf-zdbv-sba1
11
vulnerability VCID-df4x-jt3h-17hx
12
vulnerability VCID-dpc3-td9q-dyee
13
vulnerability VCID-en6t-uxtq-bfek
14
vulnerability VCID-g46h-p8jk-cuhc
15
vulnerability VCID-gvjw-funa-sqak
16
vulnerability VCID-khp6-9hfx-1kge
17
vulnerability VCID-n1hp-atex-ubh4
18
vulnerability VCID-n1w5-f5p7-xuhb
19
vulnerability VCID-p6r3-puh1-zyg6
20
vulnerability VCID-q4bb-qnxe-8bfa
21
vulnerability VCID-rncf-9nf8-wud3
22
vulnerability VCID-ue18-zzau-x7hy
23
vulnerability VCID-vdzj-kqfy-d3b7
24
vulnerability VCID-vwbu-ruxm-tbh4
25
vulnerability VCID-vxh1-8rvt-kkak
26
vulnerability VCID-vyzt-df2u-h3cc
27
vulnerability VCID-w9uy-fnpm-cbak
28
vulnerability VCID-xesd-d294-7fcx
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@8.1.0
aliases BIT-pillow-2020-35653, CVE-2020-35653, GHSA-f5g8-5qq7-938w, PYSEC-2021-69
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x15z-dejc-9ba6
9
url VCID-zmd3-henq-r7bd
vulnerability_id VCID-zmd3-henq-r7bd
summary Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2533.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2533.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-2533
reference_id
reference_type
scores
0
value 0.02195
scoring_system epss
scoring_elements 0.84388
published_at 2026-04-08T12:55:00Z
1
value 0.02195
scoring_system epss
scoring_elements 0.8433
published_at 2026-04-01T12:55:00Z
2
value 0.02195
scoring_system epss
scoring_elements 0.84405
published_at 2026-04-12T12:55:00Z
3
value 0.02195
scoring_system epss
scoring_elements 0.84411
published_at 2026-04-11T12:55:00Z
4
value 0.02195
scoring_system epss
scoring_elements 0.84394
published_at 2026-04-09T12:55:00Z
5
value 0.02195
scoring_system epss
scoring_elements 0.84366
published_at 2026-04-07T12:55:00Z
6
value 0.02195
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-02T12:55:00Z
7
value 0.02195
scoring_system epss
scoring_elements 0.84364
published_at 2026-04-04T12:55:00Z
8
value 0.02195
scoring_system epss
scoring_elements 0.84465
published_at 2026-04-29T12:55:00Z
9
value 0.02195
scoring_system epss
scoring_elements 0.84461
published_at 2026-04-26T12:55:00Z
10
value 0.02195
scoring_system epss
scoring_elements 0.84452
published_at 2026-04-24T12:55:00Z
11
value 0.02195
scoring_system epss
scoring_elements 0.84426
published_at 2026-04-21T12:55:00Z
12
value 0.02195
scoring_system epss
scoring_elements 0.84424
published_at 2026-04-18T12:55:00Z
13
value 0.02195
scoring_system epss
scoring_elements 0.84401
published_at 2026-04-13T12:55:00Z
14
value 0.02207
scoring_system epss
scoring_elements 0.84558
published_at 2026-05-07T12:55:00Z
15
value 0.02207
scoring_system epss
scoring_elements 0.84531
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-2533
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2533
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://github.com/advisories/GHSA-3c5c-7235-994j
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-3c5c-7235-994j
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-19.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2016-19.yaml
8
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
9
reference_url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst
10
reference_url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/blob/c3cb690fed5d4bf0c45576759de55d054916c165/CHANGES.rst?plain=1#L53
11
reference_url https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9
reference_id
reference_type
scores
url https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9
12
reference_url https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/5bdf54b5a76b54fb00bd05f2d733e0a4173eefc9#diff-8ff6909c159597e22288ad818938fd6b
13
reference_url https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/ae453aa18b66af54e7ff716f4ccb33adca60afd4#diff-8ff6909c159597e22288ad818938fd6b
14
reference_url https://github.com/python-pillow/Pillow/pull/1706
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/1706
15
reference_url https://security.gentoo.org/glsa/201612-52
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201612-52
16
reference_url http://www.debian.org/security/2016/dsa-3499
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2016/dsa-3499
17
reference_url http://www.openwall.com/lists/oss-security/2016/02/02/5
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/02/02/5
18
reference_url http://www.openwall.com/lists/oss-security/2016/02/22/2
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/02/22/2
19
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1304504
reference_id 1304504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1304504
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python_imaging_project:python_imaging:*:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:python:pillow:*:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-2533
reference_id CVE-2016-2533
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
3
value 7.1
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
4
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-2533
26
reference_url http://www.cvedetails.com/cve/CVE-2016-2533/
reference_id CVE-2016-2533
reference_type
scores
url http://www.cvedetails.com/cve/CVE-2016-2533/
27
reference_url https://usn.ubuntu.com/3080-1/
reference_id USN-3080-1
reference_type
scores
url https://usn.ubuntu.com/3080-1/
28
reference_url https://usn.ubuntu.com/3090-1/
reference_id USN-3090-1
reference_type
scores
url https://usn.ubuntu.com/3090-1/
fixed_packages
0
url pkg:pypi/pillow@3.1.1
purl pkg:pypi/pillow@3.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-19e1-19hk-duet
1
vulnerability VCID-1vt7-c6e3-7qc8
2
vulnerability VCID-3qb5-8p8w-gkad
3
vulnerability VCID-3uk9-eds5-rkgc
4
vulnerability VCID-53ac-ceq4-qkhf
5
vulnerability VCID-5rv4-k1q9-zue2
6
vulnerability VCID-64n5-pugj-vue8
7
vulnerability VCID-6gyu-fzpg-c3bn
8
vulnerability VCID-8n2b-wvya-53e1
9
vulnerability VCID-9ckw-ra54-z3b7
10
vulnerability VCID-and9-6jty-pyeq
11
vulnerability VCID-aubw-tsmn-ffcq
12
vulnerability VCID-b3au-rcgp-2fag
13
vulnerability VCID-b5a2-83ej-puaw
14
vulnerability VCID-brp2-dtrf-jyfr
15
vulnerability VCID-cas2-jb3y-vyhz
16
vulnerability VCID-d7uf-zdbv-sba1
17
vulnerability VCID-df4x-jt3h-17hx
18
vulnerability VCID-dpc3-td9q-dyee
19
vulnerability VCID-e3gp-zc2b-budg
20
vulnerability VCID-en6t-uxtq-bfek
21
vulnerability VCID-g46h-p8jk-cuhc
22
vulnerability VCID-gvjw-funa-sqak
23
vulnerability VCID-h4x7-7fke-mqgp
24
vulnerability VCID-haum-8zpg-6kgf
25
vulnerability VCID-hmmq-5772-bycm
26
vulnerability VCID-khp6-9hfx-1kge
27
vulnerability VCID-m3tm-h4q9-9yay
28
vulnerability VCID-n1hp-atex-ubh4
29
vulnerability VCID-n1w5-f5p7-xuhb
30
vulnerability VCID-p6r3-puh1-zyg6
31
vulnerability VCID-q4bb-qnxe-8bfa
32
vulnerability VCID-rncf-9nf8-wud3
33
vulnerability VCID-sns1-ksqr-vbhr
34
vulnerability VCID-stft-hsk9-zfdy
35
vulnerability VCID-u1en-t8ux-uube
36
vulnerability VCID-ue18-zzau-x7hy
37
vulnerability VCID-uf5t-asns-tudp
38
vulnerability VCID-vdzj-kqfy-d3b7
39
vulnerability VCID-vwbu-ruxm-tbh4
40
vulnerability VCID-vxh1-8rvt-kkak
41
vulnerability VCID-vyzt-df2u-h3cc
42
vulnerability VCID-w9uy-fnpm-cbak
43
vulnerability VCID-x15z-dejc-9ba6
44
vulnerability VCID-xesd-d294-7fcx
45
vulnerability VCID-xk66-1d31-2qbk
46
vulnerability VCID-yccg-zw89-vqff
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@3.1.1
aliases CVE-2016-2533, GHSA-3c5c-7235-994j, PYSEC-2016-19
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zmd3-henq-r7bd
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/pillow@0