Total vulnerabilities in the database
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
Software | From | Fixed in |
---|---|---|
python / pillow | 1.2 | 8.2.0.x |
python / pillow | 1.0 | 1.1.7.x |
debian / debian_linux | 9.0 | 9.0.x |
fedoraproject / fedora | 33 | 33.x |
fedoraproject / fedora | 34 | 34.x |
![]() |
- | 8.3.0 |