Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-4n96-uzyf-tud6
SummaryPillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.
Aliases
0
alias BIT-pillow-2022-45199
1
alias CVE-2022-45199
2
alias GHSA-q4mp-jvh2-76fj
3
alias PYSEC-2022-42980
Fixed_packages
0
url pkg:deb/debian/pillow@0?distro=trixie
purl pkg:deb/debian/pillow@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@0%3Fdistro=trixie
1
url pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/pillow@8.1.2%2Bdfsg-0.3%2Bdeb11u2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ec8u-v4e2-wqgn
1
vulnerability VCID-qmra-af2m-rfgx
2
vulnerability VCID-vdkd-4w7v-sbds
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@8.1.2%252Bdfsg-0.3%252Bdeb11u2%3Fdistro=trixie
2
url pkg:deb/debian/pillow@9.3.0-1?distro=trixie
purl pkg:deb/debian/pillow@9.3.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@9.3.0-1%3Fdistro=trixie
3
url pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/pillow@9.4.0-1.1%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ec8u-v4e2-wqgn
1
vulnerability VCID-qmra-af2m-rfgx
2
vulnerability VCID-vdkd-4w7v-sbds
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@9.4.0-1.1%252Bdeb12u1%3Fdistro=trixie
4
url pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/pillow@11.1.0-5%2Bdeb13u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
1
vulnerability VCID-ec8u-v4e2-wqgn
2
vulnerability VCID-qmra-af2m-rfgx
3
vulnerability VCID-vdkd-4w7v-sbds
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@11.1.0-5%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/pillow@12.1.1-2?distro=trixie
purl pkg:deb/debian/pillow@12.1.1-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-ca8h-871t-t3dd
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.1.1-2%3Fdistro=trixie
6
url pkg:deb/debian/pillow@12.2.0-1?distro=trixie
purl pkg:deb/debian/pillow@12.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/pillow@12.2.0-1%3Fdistro=trixie
7
url pkg:ebuild/dev-python/pillow@9.3.0
purl pkg:ebuild/dev-python/pillow@9.3.0
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-python/pillow@9.3.0
8
url pkg:pypi/pillow@9.3.0
purl pkg:pypi/pillow@9.3.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-5rv4-k1q9-zue2
1
vulnerability VCID-64n5-pugj-vue8
2
vulnerability VCID-9ckw-ra54-z3b7
3
vulnerability VCID-d7uf-zdbv-sba1
4
vulnerability VCID-n1hp-atex-ubh4
5
vulnerability VCID-vdzj-kqfy-d3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@9.3.0
Affected_packages
0
url pkg:pypi/pillow@9.2.0
purl pkg:pypi/pillow@9.2.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4n96-uzyf-tud6
1
vulnerability VCID-5rv4-k1q9-zue2
2
vulnerability VCID-64n5-pugj-vue8
3
vulnerability VCID-9ckw-ra54-z3b7
4
vulnerability VCID-d7uf-zdbv-sba1
5
vulnerability VCID-n1hp-atex-ubh4
6
vulnerability VCID-vdzj-kqfy-d3b7
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pillow@9.2.0
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-45199
reference_id
reference_type
scores
0
value 0.00122
scoring_system epss
scoring_elements 0.31532
published_at 2026-04-04T12:55:00Z
1
value 0.00122
scoring_system epss
scoring_elements 0.31343
published_at 2026-04-21T12:55:00Z
2
value 0.00122
scoring_system epss
scoring_elements 0.31372
published_at 2026-04-18T12:55:00Z
3
value 0.00122
scoring_system epss
scoring_elements 0.31391
published_at 2026-04-16T12:55:00Z
4
value 0.00122
scoring_system epss
scoring_elements 0.31358
published_at 2026-04-13T12:55:00Z
5
value 0.00122
scoring_system epss
scoring_elements 0.31394
published_at 2026-04-12T12:55:00Z
6
value 0.00122
scoring_system epss
scoring_elements 0.31437
published_at 2026-04-11T12:55:00Z
7
value 0.00122
scoring_system epss
scoring_elements 0.31434
published_at 2026-04-09T12:55:00Z
8
value 0.00122
scoring_system epss
scoring_elements 0.31403
published_at 2026-04-08T12:55:00Z
9
value 0.00122
scoring_system epss
scoring_elements 0.3135
published_at 2026-04-07T12:55:00Z
10
value 0.0013
scoring_system epss
scoring_elements 0.32591
published_at 2026-04-02T12:55:00Z
11
value 0.00139
scoring_system epss
scoring_elements 0.33592
published_at 2026-04-24T12:55:00Z
12
value 0.00139
scoring_system epss
scoring_elements 0.33482
published_at 2026-05-09T12:55:00Z
13
value 0.00139
scoring_system epss
scoring_elements 0.33442
published_at 2026-05-07T12:55:00Z
14
value 0.00139
scoring_system epss
scoring_elements 0.33374
published_at 2026-05-05T12:55:00Z
15
value 0.00139
scoring_system epss
scoring_elements 0.33492
published_at 2026-04-29T12:55:00Z
16
value 0.00139
scoring_system epss
scoring_elements 0.33572
published_at 2026-04-26T12:55:00Z
17
value 0.00146
scoring_system epss
scoring_elements 0.34617
published_at 2026-05-14T12:55:00Z
18
value 0.00146
scoring_system epss
scoring_elements 0.34548
published_at 2026-05-12T12:55:00Z
19
value 0.00146
scoring_system epss
scoring_elements 0.34522
published_at 2026-05-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-45199
1
reference_url https://bugs.gentoo.org/878769
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugs.gentoo.org/878769
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pillow/PYSEC-2022-42980.yaml
4
reference_url https://github.com/python-pillow/Pillow
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow
5
reference_url https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
6
reference_url https://github.com/python-pillow/Pillow/pull/6700
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/pull/6700
7
reference_url https://github.com/python-pillow/Pillow/releases/tag/9.3.0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/python-pillow/Pillow/releases/tag/9.3.0
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-45199
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-45199
9
reference_url https://security.gentoo.org/glsa/202211-10
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202211-10
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024512
reference_id 1024512
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1024512
11
reference_url https://github.com/advisories/GHSA-q4mp-jvh2-76fj
reference_id GHSA-q4mp-jvh2-76fj
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q4mp-jvh2-76fj
Weaknesses
0
cwe_id 400
name Uncontrolled Resource Consumption
description The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
1
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
2
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
Exploits
Severity_range_score5.3 - 8.9
Exploitability0.5
Weighted_severity8.0
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-4n96-uzyf-tud6