Total
52 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2014-3589 | 3 Debian, Opensuse, Python | 3 Python-imaging, Opensuse, Pillow | 2024-11-21 | 5.0 MEDIUM | N/A |
PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size. | |||||
CVE-2014-3007 | 2 Python, Pythonware | 2 Pillow, Python Imaging Library | 2024-11-21 | 10.0 HIGH | N/A |
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py. | |||||
CVE-2014-1933 | 2 Python, Pythonware | 2 Pillow, Python Imaging Library | 2024-11-21 | 2.1 LOW | N/A |
The (1) JpegImagePlugin.py and (2) EpsImagePlugin.py scripts in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 uses the names of temporary files on the command line, which makes it easier for local users to conduct symlink attacks by listing the processes. | |||||
CVE-2014-1932 | 2 Python, Pythonware | 2 Pillow, Python Imaging Library | 2024-11-21 | 4.4 MEDIUM | N/A |
The (1) load_djpeg function in JpegImagePlugin.py, (2) Ghostscript function in EpsImagePlugin.py, (3) load function in IptcImagePlugin.py, and (4) _copy function in Image.py in Python Image Library (PIL) 1.1.7 and earlier and Pillow before 2.3.1 do not properly create temporary files, which allow local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on the temporary file. | |||||
CVE-2022-22817 | 2 Debian, Python | 2 Debian Linux, Pillow | 2024-10-15 | 7.5 HIGH | 9.8 CRITICAL |
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used. | |||||
CVE-2023-50447 | 2 Debian, Python | 2 Debian Linux, Pillow | 2024-08-01 | N/A | 8.1 HIGH |
Pillow through 10.1.0 allows PIL.ImageMath.eval Arbitrary Code Execution via the environment parameter, a different vulnerability than CVE-2022-22817 (which was about the expression parameter). | |||||
CVE-2023-44271 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-03-22 | N/A | 7.5 HIGH |
An issue was discovered in Pillow before 10.0.0. It is a Denial of Service that uncontrollably allocates memory to process a given task, potentially causing a service to crash by having it run out of memory. This occurs for truetype in ImageFont when textlength in an ImageDraw instance operates on a long text argument. | |||||
CVE-2021-23437 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-03-22 | 5.0 MEDIUM | 7.5 HIGH |
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function. | |||||
CVE-2022-45198 | 1 Python | 1 Pillow | 2024-02-04 | N/A | 7.5 HIGH |
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification). | |||||
CVE-2022-45199 | 1 Python | 1 Pillow | 2024-02-04 | N/A | 7.5 HIGH |
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL. | |||||
CVE-2022-24303 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. | |||||
CVE-2022-30595 | 1 Python | 1 Pillow | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
libImaging/TgaRleDecode.c in Pillow 9.1.0 has a heap buffer overflow in the processing of invalid TGA image files. | |||||
CVE-2022-22815 | 2 Debian, Python | 2 Debian Linux, Pillow | 2024-02-04 | 6.4 MEDIUM | 6.5 MEDIUM |
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path. | |||||
CVE-2022-22816 | 2 Debian, Python | 2 Debian Linux, Pillow | 2024-02-04 | 6.4 MEDIUM | 6.5 MEDIUM |
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path. | |||||
CVE-2021-25288 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_gray_i. | |||||
CVE-2021-25287 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 6.4 MEDIUM | 9.1 CRITICAL |
An issue was discovered in Pillow before 8.2.0. There is an out-of-bounds read in J2kDecode, in j2ku_graya_la. | |||||
CVE-2021-28675 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 4.3 MEDIUM | 5.5 MEDIUM |
An issue was discovered in Pillow before 8.2.0. PSDImagePlugin.PsdImageFile lacked a sanity check on the number of input layers relative to the size of the data block. This could lead to a DoS on Image.open prior to Image.load. | |||||
CVE-2021-28676 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Pillow before 8.2.0. For FLI data, FliDecode did not properly check that the block advance was non-zero, potentially leading to an infinite loop on load. | |||||
CVE-2021-34552 | 3 Debian, Fedoraproject, Python | 3 Debian Linux, Fedora, Pillow | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c. | |||||
CVE-2021-28677 | 2 Fedoraproject, Python | 2 Fedora, Pillow | 2024-02-04 | 5.0 MEDIUM | 7.5 HIGH |
An issue was discovered in Pillow before 8.2.0. For EPS data, the readline implementation used in EPSImageFile has to deal with any combination of \r and \n as line endings. It used an accidentally quadratic method of accumulating lines while looking for a line ending. A malicious EPS file could use this to perform a DoS of Pillow in the open phase, before an image was accepted for opening. |