296,854
Total vulnerabilities in the database
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
| Software | From | Fixed in |
|---|---|---|
| python / pillow | 1.2 | 8.2.0.x |
| python / pillow | 1.0 | 1.1.7.x |
| debian / debian_linux | 9.0 | 9.0.x |
| fedoraproject / fedora | 33 | 33.x |
| fedoraproject / fedora | 34 | 34.x |
Pillow
|
- | 8.3.0 |