Vulnerabilities > Python > Pillow

DATE CVE VULNERABILITY TITLE RISK
2016-11-04 CVE-2016-9190 Improper Access Control vulnerability in multiple products
Pillow before 3.3.2 allows context-dependent attackers to execute arbitrary code by using the "crafted image file" approach, related to an "Insecure Sign Extension" issue affecting the ImagingNew in Storage.c component.
6.8
2016-11-04 CVE-2016-9189 Integer Overflow or Wraparound vulnerability in multiple products
Pillow before 3.3.2 allows context-dependent attackers to obtain sensitive information by using the "crafted image file" approach, related to an "Integer Overflow" issue affecting the Image.core.map_buffer in map.c component.
4.3
2016-04-13 CVE-2016-4009 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Python Pillow
Integer overflow in the ImagingResampleHorizontal function in libImaging/Resample.c in Pillow before 3.1.1 allows remote attackers to have unspecified impact via negative values of the new size, which triggers a heap-based buffer overflow.
network
low complexity
python CWE-119
critical
10.0
2016-04-13 CVE-2016-2533 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Buffer overflow in the ImagingPcdDecode function in PcdDecode.c in Pillow before 3.1.1 and Python Imaging Library (PIL) 1.1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted PhotoCD file.
4.3
2016-04-13 CVE-2016-0775 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
4.3
2016-04-13 CVE-2016-0740 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
4.3
2015-05-01 CVE-2014-3598 Resource Management Errors vulnerability in multiple products
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.
network
low complexity
opensuse python CWE-399
5.0
2015-01-16 CVE-2014-9601 Improper Input Validation vulnerability in multiple products
Pillow before 2.7.0 allows remote attackers to cause a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed.
network
low complexity
python oracle fedoraproject opensuse CWE-20
5.0
2014-08-25 CVE-2014-3589 Improper Input Validation vulnerability in multiple products
PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
network
low complexity
debian python opensuse CWE-20
5.0
2014-04-27 CVE-2014-3007 OS Command Injection vulnerability in multiple products
Python Image Library (PIL) 1.1.7 and earlier and Pillow 2.3 might allow remote attackers to execute arbitrary commands via shell metacharacters in unspecified vectors related to CVE-2014-1932, possibly JpegImagePlugin.py.
network
low complexity
python pythonware CWE-78
critical
10.0