Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
pillow Vendor: python

About This Product

pillow is a software product offered by python. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 55 known vulnerabilities affecting python pillow. This includes 10 critical-severity issues and 25 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2014 to 2026, indicating a sustained research interest and ongoing security attention. 19 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-1932 2014-04-17 2025-04-12 - 4.4 Unknown
CVE-2014-1933 2014-04-17 2025-04-12 - 2.1 Unknown
CVE-2014-3007 2014-04-27 2025-04-12 - 10.0 Likely
CVE-2014-3589 2014-08-25 2025-04-12 - 5.0 Likely
CVE-2014-9601 2015-01-16 2025-04-12 - 5.0 Likely
CVE-2014-3598 2015-05-01 2025-04-12 - 5.0 Likely
CVE-2016-0740 2016-04-13 2025-04-12 6.5 4.3 Likely
CVE-2016-0775 2016-04-13 2025-04-12 6.5 4.3 Likely
CVE-2016-2533 2016-04-13 2025-04-12 6.5 4.3 Likely
CVE-2016-4009 2016-04-13 2025-04-12 9.8 10.0 Likely
CVE-2016-9189 2016-11-04 2025-04-12 5.5 4.3 Likely
CVE-2016-9190 2016-11-04 2025-04-12 7.8 6.8 Likely
CVE-2016-3076 2017-04-24 2025-04-20 5.5 4.3 Likely
CVE-2019-16865 2019-10-04 2024-11-21 7.5 5.0 Likely
CVE-2020-5310 2020-01-03 2024-11-21 8.8 6.8 Likely
CVE-2020-5311 2020-01-03 2024-11-21 9.8 7.5 Likely
CVE-2020-5312 2020-01-03 2024-11-21 9.8 7.5 Likely
CVE-2020-5313 2020-01-03 2024-11-21 7.1 5.8 Likely
CVE-2019-19911 2020-01-05 2024-11-21 7.5 5.0 Likely
CVE-2020-10177 2020-06-25 2024-11-21 5.5 4.3 Likely
CVE-2020-10378 2020-06-25 2024-11-21 5.5 4.3 Likely
CVE-2020-10379 2020-06-25 2024-11-21 7.8 6.8 Likely
CVE-2020-10994 2020-06-25 2024-11-21 5.5 4.3 Likely
CVE-2020-11538 2020-06-25 2024-11-21 8.1 6.8 Likely
CVE-2020-35653 2021-01-12 2024-11-21 7.1 5.8 Likely
CVE-2020-35654 2021-01-12 2024-11-21 8.8 6.8 Likely
CVE-2020-35655 2021-01-12 2024-11-21 5.4 5.8 Likely
CVE-2021-27921 2021-03-03 2025-08-15 7.5 5.0 Likely
CVE-2021-27922 2021-03-03 2025-08-15 7.5 5.0 Likely
CVE-2021-27923 2021-03-03 2025-08-15 7.5 5.0 Likely
CVE-2021-25289 2021-03-19 2024-11-21 9.8 7.5 Likely
CVE-2021-25290 2021-03-19 2024-11-21 7.5 5.0 Likely
CVE-2021-25291 2021-03-19 2024-11-21 7.5 5.0 Likely
CVE-2021-25292 2021-03-19 2024-11-21 6.5 4.3 Likely
CVE-2021-25293 2021-03-19 2024-11-21 7.5 5.0 Likely
CVE-2021-28675 2021-06-02 2024-11-21 5.5 4.3 Likely
CVE-2021-25287 2021-06-02 2024-11-21 9.1 6.4 Likely
CVE-2021-25288 2021-06-02 2024-11-21 9.1 6.4 Likely
CVE-2021-28676 2021-06-02 2024-11-21 7.5 5.0 Likely
CVE-2021-28677 2021-06-02 2024-11-21 7.5 5.0 Likely
CVE-2021-28678 2021-06-02 2024-11-21 5.5 4.3 Likely
CVE-2021-34552 2021-07-13 2024-11-21 9.8 7.5 Likely
CVE-2021-23437 2021-09-03 2024-11-21 7.5 5.0 Likely
CVE-2022-22815 2022-01-10 2024-11-21 6.5 6.4 Likely
CVE-2022-22816 2022-01-10 2024-11-21 6.5 6.4 Likely
CVE-2022-22817 2022-01-10 2024-11-21 9.8 7.5 Likely
CVE-2022-24303 2022-03-28 2024-11-21 9.1 6.4 Likely
CVE-2022-30595 2022-05-25 2024-11-21 9.8 7.5 Likely
CVE-2022-45198 2022-11-14 2024-11-21 7.5 - -
CVE-2022-45199 2022-11-14 2024-11-21 7.5 - -
CVE-2023-44271 2023-11-03 2024-11-21 7.5 - -
CVE-2023-50447 2024-01-19 2024-11-21 8.1 - -
CVE-2024-28219 2024-04-03 2025-11-04 6.7 - -
CVE-2025-48379 2025-07-01 2025-10-15 7.1 - -
CVE-2026-25990 2026-02-11 2026-02-13 7.5 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for python pillow by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.