pillow package update fixs 3 vulnerabilitie
Reporter | Title | Published | Views | Family All 162 |
---|---|---|---|---|
OSV | pillow - security update | 6 Jan 202000:00 | – | osv |
OSV | pillow - security update | 21 Feb 202000:00 | – | osv |
OSV | Uncontrolled Resource Consumption in Pillow | 1 Apr 202016:36 | – | osv |
OSV | PYSEC-2020-172 | 5 Jan 202022:15 | – | osv |
OSV | CVE-2019-19911 | 5 Jan 202022:15 | – | osv |
OSV | BIT-pillow-2020-5313 | 6 Mar 202411:05 | – | osv |
OSV | CVE-2020-5313 | 3 Jan 202001:15 | – | osv |
OSV | CVE-2020-5312 | 3 Jan 202001:15 | – | osv |
OSV | Red Hat Security Advisory: python-imaging security update | 14 Sep 202400:39 | – | osv |
OSV | Out-of-bounds Read in Pillow | 1 Apr 202016:36 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 9 | armhf | python-pil.imagetk-dbg | 4.0.0-4+deb9u1 | python-pil.imagetk-dbg_4.0.0-4+deb9u1_armhf.deb |
Debian | 10 | mipsel | python3-pil.imagetk-dbg | 5.4.1-2+deb10u1 | python3-pil.imagetk-dbg_5.4.1-2+deb10u1_mipsel.deb |
Debian | 9 | arm64 | python3-pil.imagetk | 4.0.0-4+deb9u1 | python3-pil.imagetk_4.0.0-4+deb9u1_arm64.deb |
Debian | 10 | armhf | python-pil.imagetk-dbg | 5.4.1-2+deb10u1 | python-pil.imagetk-dbg_5.4.1-2+deb10u1_armhf.deb |
Debian | 9 | i386 | python3-pil.imagetk-dbg | 4.0.0-4+deb9u1 | python3-pil.imagetk-dbg_4.0.0-4+deb9u1_i386.deb |
Debian | 10 | mips64el | python3-pil | 5.4.1-2+deb10u1 | python3-pil_5.4.1-2+deb10u1_mips64el.deb |
Debian | 10 | ppc64el | python-pil.imagetk | 5.4.1-2+deb10u1 | python-pil.imagetk_5.4.1-2+deb10u1_ppc64el.deb |
Debian | 10 | amd64 | python-pil-dbg | 5.4.1-2+deb10u1 | python-pil-dbg_5.4.1-2+deb10u1_amd64.deb |
Debian | 10 | i386 | python-pil.imagetk | 5.4.1-2+deb10u1 | python-pil.imagetk_5.4.1-2+deb10u1_i386.deb |
Debian | 8 | i386 | python-pil-dbg | 2.6.1-2+deb8u4 | python-pil-dbg_2.6.1-2+deb8u4_i386.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo