CVE-2015-7981 (GCVE-0-2015-7981)
Vulnerability from cvelistv5
Published
2015-11-24 20:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
1.23% (0.78018)
Summary
The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-2594.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2015-2595.html
cve@mitre.orghttp://sourceforge.net/p/libpng/bugs/241/
cve@mitre.orghttp://sourceforge.net/projects/libpng/files/libpng10/1.0.64/
cve@mitre.orghttp://sourceforge.net/projects/libpng/files/libpng12/1.2.54/Patch
cve@mitre.orghttp://sourceforge.net/projects/libpng/files/libpng14/1.4.17/Exploit
cve@mitre.orghttp://www.debian.org/security/2015/dsa-3399
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/10/26/1
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2015/10/26/3
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
cve@mitre.orghttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
cve@mitre.orghttp://www.securityfocus.com/bid/77304
cve@mitre.orghttp://www.securitytracker.com/id/1034393
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2815-1
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2016:1430
cve@mitre.orghttps://security.gentoo.org/glsa/201611-08
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-2594.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2015-2595.html
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/p/libpng/bugs/241/
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/Patch
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2015/dsa-3399
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/10/26/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2015/10/26/3
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/77304
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034393
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2815-1
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2016:1430
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201611-08
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T08:06:31.465Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  name: "77304",
                  tags: [
                     "vdb-entry",
                     "x_refsource_BID",
                     "x_transferred",
                  ],
                  url: "http://www.securityfocus.com/bid/77304",
               },
               {
                  name: "[oss-security] 20151026 CVE Requests for read out of bound in libpng",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/10/26/1",
               },
               {
                  name: "openSUSE-SU-2015:2136",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/",
               },
               {
                  name: "FEDORA-2015-ec2ddd15d7",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html",
               },
               {
                  name: "GLSA-201611-08",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_GENTOO",
                     "x_transferred",
                  ],
                  url: "https://security.gentoo.org/glsa/201611-08",
               },
               {
                  name: "[oss-security] 20151026 Re: CVE Requests for read out of bound in libpng",
                  tags: [
                     "mailing-list",
                     "x_refsource_MLIST",
                     "x_transferred",
                  ],
                  url: "http://www.openwall.com/lists/oss-security/2015/10/26/3",
               },
               {
                  name: "FEDORA-2015-501493d853",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/",
               },
               {
                  name: "RHSA-2016:1430",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "https://access.redhat.com/errata/RHSA-2016:1430",
               },
               {
                  name: "FEDORA-2015-1d87313b7c",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_FEDORA",
                     "x_transferred",
                  ],
                  url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html",
               },
               {
                  name: "DSA-3399",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_DEBIAN",
                     "x_transferred",
                  ],
                  url: "http://www.debian.org/security/2015/dsa-3399",
               },
               {
                  name: "RHSA-2015:2595",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-2595.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
               },
               {
                  name: "1034393",
                  tags: [
                     "vdb-entry",
                     "x_refsource_SECTRACK",
                     "x_transferred",
                  ],
                  url: "http://www.securitytracker.com/id/1034393",
               },
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "http://sourceforge.net/p/libpng/bugs/241/",
               },
               {
                  name: "openSUSE-SU-2015:2099",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_SUSE",
                     "x_transferred",
                  ],
                  url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html",
               },
               {
                  name: "USN-2815-1",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_UBUNTU",
                     "x_transferred",
                  ],
                  url: "http://www.ubuntu.com/usn/USN-2815-1",
               },
               {
                  name: "RHSA-2015:2594",
                  tags: [
                     "vendor-advisory",
                     "x_refsource_REDHAT",
                     "x_transferred",
                  ],
                  url: "http://rhn.redhat.com/errata/RHSA-2015-2594.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2015-10-26T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-06-30T16:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               name: "77304",
               tags: [
                  "vdb-entry",
                  "x_refsource_BID",
               ],
               url: "http://www.securityfocus.com/bid/77304",
            },
            {
               name: "[oss-security] 20151026 CVE Requests for read out of bound in libpng",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/10/26/1",
            },
            {
               name: "openSUSE-SU-2015:2136",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/",
            },
            {
               name: "FEDORA-2015-ec2ddd15d7",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html",
            },
            {
               name: "GLSA-201611-08",
               tags: [
                  "vendor-advisory",
                  "x_refsource_GENTOO",
               ],
               url: "https://security.gentoo.org/glsa/201611-08",
            },
            {
               name: "[oss-security] 20151026 Re: CVE Requests for read out of bound in libpng",
               tags: [
                  "mailing-list",
                  "x_refsource_MLIST",
               ],
               url: "http://www.openwall.com/lists/oss-security/2015/10/26/3",
            },
            {
               name: "FEDORA-2015-501493d853",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/",
            },
            {
               name: "RHSA-2016:1430",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "https://access.redhat.com/errata/RHSA-2016:1430",
            },
            {
               name: "FEDORA-2015-1d87313b7c",
               tags: [
                  "vendor-advisory",
                  "x_refsource_FEDORA",
               ],
               url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html",
            },
            {
               name: "DSA-3399",
               tags: [
                  "vendor-advisory",
                  "x_refsource_DEBIAN",
               ],
               url: "http://www.debian.org/security/2015/dsa-3399",
            },
            {
               name: "RHSA-2015:2595",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-2595.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
            },
            {
               name: "1034393",
               tags: [
                  "vdb-entry",
                  "x_refsource_SECTRACK",
               ],
               url: "http://www.securitytracker.com/id/1034393",
            },
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "http://sourceforge.net/p/libpng/bugs/241/",
            },
            {
               name: "openSUSE-SU-2015:2099",
               tags: [
                  "vendor-advisory",
                  "x_refsource_SUSE",
               ],
               url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html",
            },
            {
               name: "USN-2815-1",
               tags: [
                  "vendor-advisory",
                  "x_refsource_UBUNTU",
               ],
               url: "http://www.ubuntu.com/usn/USN-2815-1",
            },
            {
               name: "RHSA-2015:2594",
               tags: [
                  "vendor-advisory",
                  "x_refsource_REDHAT",
               ],
               url: "http://rhn.redhat.com/errata/RHSA-2015-2594.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2015-7981",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "77304",
                     refsource: "BID",
                     url: "http://www.securityfocus.com/bid/77304",
                  },
                  {
                     name: "[oss-security] 20151026 CVE Requests for read out of bound in libpng",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/10/26/1",
                  },
                  {
                     name: "openSUSE-SU-2015:2136",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html",
                  },
                  {
                     name: "http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/",
                  },
                  {
                     name: "FEDORA-2015-ec2ddd15d7",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html",
                  },
                  {
                     name: "GLSA-201611-08",
                     refsource: "GENTOO",
                     url: "https://security.gentoo.org/glsa/201611-08",
                  },
                  {
                     name: "[oss-security] 20151026 Re: CVE Requests for read out of bound in libpng",
                     refsource: "MLIST",
                     url: "http://www.openwall.com/lists/oss-security/2015/10/26/3",
                  },
                  {
                     name: "FEDORA-2015-501493d853",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html",
                  },
                  {
                     name: "http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/",
                  },
                  {
                     name: "RHSA-2016:1430",
                     refsource: "REDHAT",
                     url: "https://access.redhat.com/errata/RHSA-2016:1430",
                  },
                  {
                     name: "FEDORA-2015-1d87313b7c",
                     refsource: "FEDORA",
                     url: "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html",
                  },
                  {
                     name: "DSA-3399",
                     refsource: "DEBIAN",
                     url: "http://www.debian.org/security/2015/dsa-3399",
                  },
                  {
                     name: "RHSA-2015:2595",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-2595.html",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                  },
                  {
                     name: "http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/",
                  },
                  {
                     name: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
                     refsource: "CONFIRM",
                     url: "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
                  },
                  {
                     name: "1034393",
                     refsource: "SECTRACK",
                     url: "http://www.securitytracker.com/id/1034393",
                  },
                  {
                     name: "http://sourceforge.net/p/libpng/bugs/241/",
                     refsource: "CONFIRM",
                     url: "http://sourceforge.net/p/libpng/bugs/241/",
                  },
                  {
                     name: "openSUSE-SU-2015:2099",
                     refsource: "SUSE",
                     url: "http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html",
                  },
                  {
                     name: "USN-2815-1",
                     refsource: "UBUNTU",
                     url: "http://www.ubuntu.com/usn/USN-2815-1",
                  },
                  {
                     name: "RHSA-2015:2594",
                     refsource: "REDHAT",
                     url: "http://rhn.redhat.com/errata/RHSA-2015-2594.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2015-7981",
      datePublished: "2015-11-24T20:00:00",
      dateReserved: "2015-10-26T00:00:00",
      dateUpdated: "2024-08-06T08:06:31.465Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      fkie_nvd: {
         configurations: "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\", \"matchCriteriaId\": \"B5A6F2F3-4894-4392-8296-3B8DD2679084\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E88A537F-F4D0-46B9-9E37-965233C2A355\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F59A04-14CF-49E2-9973-645477EA09DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33C068A4-3780-4EAB-A937-6082DF847564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C84489B-B08C-4854-8A12-D01B6E45CF79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39A901D6-0874-46A4-92A8-5F72C7A89E85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EF4996-72F4-4FA4-814F-F5991E7A8318\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44B067C7-735E-43C9-9188-7E1522A02491\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29050958-EFD8-4A79-9022-EF72AAD4EDB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3CB33B1-71B2-4235-A2C1-FCAEA9844A6A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"436F8C71-1780-4DC6-937B-8F1F51C7453D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B79DC5F-5062-4031-BA11-746EE3C8E1CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F2B503-1516-465D-A558-9932BDB3457D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA94EAAA-A4D2-4E36-BC69-BBE9644FE970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3A7C96C-8FBB-42B4-937E-3321C939CC87\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94084356-D39B-41B2-AC24-0ADAD0BF5988\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"086C6335-7872-46A7-AEB1-9BE5AE5A788C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF8233B1-04A0-4E25-97EE-CF466B48A12E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA714E7E-05EF-4598-9324-887BC66C675E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5CF3B73-D3B9-4D76-B411-C837BCE0806E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1752D91-3468-4E22-B60F-6789B3CBD7B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93E210A7-489B-4EA7-A840-599523157DD3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B37565FA-72F5-4063-8D7A-97BC269F020B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC8FA821-818E-4BC7-834B-94EB5C042390\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3FBF3D3-95A6-4869-8A69-F0E5ECA40220\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D07785D0-E995-4208-AB8C-43B320D291F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19BBA666-4473-4C6D-BF48-34EF3F09AD7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2763A6C7-DBBA-4E2A-917C-B6FF524B9891\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DECDF8-7742-4D58-99FA-100A01748B05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4FD3B1-3A68-4122-AA50-31BFC6C50408\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45790331-CE26-457F-8649-F027703E73EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B0BFE2D-5C7B-42E0-B783-8C5907CA8635\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7CD993C1-70B6-4ACB-B958-94E7EF973A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C085686C-A0AA-4F56-9E7D-B5CB24B890D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D02A5197-06B9-469E-9817-45BB23324042\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EB6BE37-E564-4E42-BE39-36DD301C37A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"314209F2-E0A0-4045-8108-8E7215312442\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11A8ECBB-7E50-4447-88E2-893C1466C251\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B8F24A5-F5C3-495F-9AF0-2EE836E0147A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"46DE2DE3-F081-4B80-A4DA-C5AB27B3CA8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71EF1D77-7838-47DF-B6A2-DBBAC0058FED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76BA4FEA-FEB4-47A9-9DFF-A233CEE03D04\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60DB5A63-E89E-48AB-A846-107EBEC71D67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2181FEEB-D07E-490C-9953-3490D87B63A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36DC41DD-A291-4ECE-84B9-574828AA2A80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"015D1E36-17A1-4413-B1FB-5DF4C36712BD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F64CE8F2-22B1-43F8-8934-CBCD2EFBA85D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEB15BE8-1B88-4117-AF14-3AA2B54DB323\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2CB2728-4CC7-46EA-809B-450A9BB9F884\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"96638963-D264-49AD-9B77-497C3DA23DFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88544BBE-29A1-4622-B3E6-FA4B891A9B5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD658D98-9A4D-4DC2-A935-BB3BF0E0FB2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FFF819AF-AC11-4BD9-A070-572836A65FB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2EEAC62D-BF2B-40DF-9428-FFBF7CA09471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*\", \"matchCriteriaId\": \"27DFAB04-5C5C-4366-B3FC-C83AAB807F0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36327723-F953-4BD3-A525-930DDCF7931D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F717B1-CC02-4878-9A78-1584074E81C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D482811-2EF1-47AE-A41C-7532AC6DEF31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF26AB67-81F8-4CD2-8E28-BDF9FE2CD58F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.58:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D0EE98D-0596-4147-9EC4-F3616BF2B901\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.59:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62F15027-0E80-48B7-9ECD-9E7228F0E81B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.60:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99904D7E-0046-4481-99B6-01710D4FC848\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.61:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AB33B4E-E69A-4002-816C-24CCD49682F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.62:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42A4FAF1-4B81-47C4-BFB7-6052524A2DA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.0.63:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"686A50C3-93E1-4C3F-8089-322BE26E6317\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C036011A-9AE1-423C-8B73-188B9BA20FEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8051459E-94D3-4D4A-9D40-CC9475DDB00C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42056C63-69A7-43CF-828C-0C3E365702D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B6A39A3-7F86-4DC3-B248-859630AFB9A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58377AE3-1C13-4C3F-BC55-8336DAEEF97F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"005C2DA4-D00E-4206-851E-9226D66B5F2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97B17602-0D97-469B-A9B1-30AAC8F758F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"857B664A-C6F9-45E3-93EA-C0F53CEF5C46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DFDA458-74E8-4DEF-B524-A4A8672CB66A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A3E3BF3-4376-4692-A515-A7B6593F28F1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B1AC712-110D-458F-B650-930C6D45CA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F848FA5-9682-454F-A9DE-671C4401F15F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4B83678-98A1-440E-950C-4A27995C7294\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB9EEE31-479A-4370-BF00-C26C1AF502B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95EABD7D-1F18-4FA5-BAA9-F8D69129E531\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65B836CA-3740-48B0-966B-21E65EF3D636\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3988FA1B-18D9-46AA-87BA-A6B01D4F4B25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51A46409-7AC6-45DB-B92D-29988C445BC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09E2B608-6C70-446F-A3A7-369048D99855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AA00AE0-F447-4361-AA37-0C98BDE491E3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"220A02AF-6ADA-4B75-BC81-40B2D847029A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ECEB8F61-195E-41DE-90CE-22854055E9D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"111091B9-CBAE-4FC7-8B97-7D2345BFCB45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"54C6D9D3-50B2-4A63-B3D1-C76C70F4443E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4110AA74-C69D-45BC-A630-9EE3A2036BD6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CAA1090-C1C7-43A2-BD44-065572D226B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2FD92305-91BF-4984-A029-8FA83CBF1A12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"31EE280F-D76D-478B-ADD6-D5F2C7574A2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747314F7-A515-41FF-8095-62A9F05F0DEA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1BE9ED0-685B-41F0-A984-D33E7034AEA7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3F6AD99-7697-47E5-8301-723C16535C76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B00AD3-D13C-45B5-A13A-9092D40F4A63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14222EA8-E8ED-4818-ACB4-C6A13643F210\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A22C28DD-5C99-4722-9093-A1E82A2C2808\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93714B71-6331-4F5A-A12A-B4B80CA2FEC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10CD562E-1F06-4779-A29C-4069E3C86B16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D83D507-64AF-4158-97B9-1353E2F8EE46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC5E39EA-C32E-4E87-9A3F-CCB5144F0E68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*\", \"matchCriteriaId\": \"61B9103F-CD72-4F06-BED1-7AE4AB9E672C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DF6249D-5AA8-4EA3-A92A-0E492FE5B811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDE7F259-40A2-4866-8EF8-44A9913EC4EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*\", \"matchCriteriaId\": \"CFA3EED5-F0AB-4C5C-92D7-B84BFDAA31AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03C20A42-6A77-43D4-80D7-332BB2DF1B66\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A0A1B56-0E92-4E81-9B2C-4F9B9D5833EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D4CC5DBB-249B-4EED-9F54-E23CB1919ED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*\", \"matchCriteriaId\": \"C10D9119-0FF8-4DFE-8632-A14D9C83CC9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"088A1BDB-BB1A-46B5-898B-23311DE27CE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*\", \"matchCriteriaId\": \"C24CA735-6EA6-41E3-A82D-D443BB47806B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.49:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CBAA828-F42A-420F-B17E-6FACF6CD483D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.50:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D20664A4-4816-4F57-82BB-F4116FA33A41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.51:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64226521-0723-4259-B214-0D2A35CF5FBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.52:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6ABEEBFE-A8C8-40D4-97D8-F06676E67478\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.2.53:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47831D80-33AC-4A13-B92D-3D2CBF215955\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52D5DAA1-3632-48D7-A657-4A4C83A119D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB5AE8E0-3C11-4EE1-A599-4D70C6A13F1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD36C3B-3C02-488B-B480-EA091D702CA3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59BAD272-D4B6-40CE-B5E9-63145E12B638\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EEB311C-766D-4070-A0BE-9CE4593C8F49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C185BF59-68E4-49F8-802F-C06FE840FF3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C399B31-B8EC-41C4-B6AB-83BABC474374\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B00AF5F-D4F5-490C-8BF4-2B33EFBF15A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA9AEB1D-0AA7-4842-9CF9-91BFD8B58A4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09150152-5DEA-4FA2-9163-63EAF4D83DEF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"45E5068A-42BE-478B-8C00-FE23B7837DC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"023CCFB0-7995-408E-928A-76C5BD9B4924\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"493F615D-DB81-48B3-9E74-C32544A01372\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2F12925-44F7-4790-8A06-345EB3DCCB71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F5BF226-D62F-4F54-B771-EB108FD256FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2EDBFCB-96DA-4A36-873A-3164975BE997\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:libpng:libpng:1.4.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACDB15BE-BDD2-4210-B224-A520E8DC7D89\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BBCD86A-E6C7-4444-9D74-F861084090F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA856400-1B48-429A-94A0-173B7EEE1EC2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}]",
         descriptions: "[{\"lang\": \"en\", \"value\": \"The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n png_convert_to_rfc1123 en png.c en libpng 1.0.x en versiones anteriores a 1.0.64, 1.2.x en versiones anteriores a 1.2.54 y 1.4.x en versiones anteriores a 1.4.17 permite a atacantes remotos obtener informaci\\u00f3n sensible de la memoria de proceso a trav\\u00e9s de un fragmento de datos tlME manipulado en un archivo de imagen, lo que desencadena una lectura fuera de rango.\"}]",
         id: "CVE-2015-7981",
         lastModified: "2024-11-21T02:37:46.637",
         metrics: "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
         published: "2015-11-24T20:59:15.017",
         references: "[{\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-2594.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-2595.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sourceforge.net/p/libpng/bugs/241/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3399\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/10/26/1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/10/26/3\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/77304\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securitytracker.com/id/1034393\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2815-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1430\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201611-08\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-2594.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2015-2595.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sourceforge.net/p/libpng/bugs/241/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.debian.org/security/2015/dsa-3399\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/10/26/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2015/10/26/3\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/77304\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securitytracker.com/id/1034393\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2815-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2016:1430\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201611-08\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
         sourceIdentifier: "cve@mitre.org",
         vulnStatus: "Modified",
         weaknesses: "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-200\"}]}]",
      },
      nvd: "{\"cve\":{\"id\":\"CVE-2015-7981\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-11-24T20:59:15.017\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.\"},{\"lang\":\"es\",\"value\":\"La función png_convert_to_rfc1123 en png.c en libpng 1.0.x en versiones anteriores a 1.0.64, 1.2.x en versiones anteriores a 1.2.54 y 1.4.x en versiones anteriores a 1.4.17 permite a atacantes remotos obtener información sensible de la memoria de proceso a través de un fragmento de datos tlME manipulado en un archivo de imagen, lo que desencadena una lectura fuera de rango.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*\",\"matchCriteriaId\":\"B5A6F2F3-4894-4392-8296-3B8DD2679084\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F38D3B7E-8429-473F-BB31-FC3583EE5A5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E88A537F-F4D0-46B9-9E37-965233C2A355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C84489B-B08C-4854-8A12-D01B6E45CF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39A901D6-0874-46A4-92A8-5F72C7A89E85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C8D871B-AEA1-4407-AEE3-47EC782250FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D6B3DAF-DF99-48B2-8E7C-BE8E043D4C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29050958-EFD8-4A79-9022-EF72AAD4EDB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CB33B1-71B2-4235-A2C1-FCAEA9844A6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"436F8C71-1780-4DC6-937B-8F1F51C7453D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BF2C6F3-BFE7-4234-9975-DE7FCDA26A46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B79DC5F-5062-4031-BA11-746EE3C8E1CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAD6DE25-8B2F-4DB9-9969-8AAC23BC0AE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F2B503-1516-465D-A558-9932BDB3457D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA94EAAA-A4D2-4E36-BC69-BBE9644FE970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3A7C96C-8FBB-42B4-937E-3321C939CC87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94084356-D39B-41B2-AC24-0ADAD0BF5988\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086C6335-7872-46A7-AEB1-9BE5AE5A788C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF8233B1-04A0-4E25-97EE-CF466B48A12E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA714E7E-05EF-4598-9324-887BC66C675E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5CF3B73-D3B9-4D76-B411-C837BCE0806E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1752D91-3468-4E22-B60F-6789B3CBD7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F433AA7E-A780-4D45-AD1A-5A4CE1F3FCD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93E210A7-489B-4EA7-A840-599523157DD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B37565FA-72F5-4063-8D7A-97BC269F020B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC8FA821-818E-4BC7-834B-94EB5C042390\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3FBF3D3-95A6-4869-8A69-F0E5ECA40220\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07785D0-E995-4208-AB8C-43B320D291F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"152DDD6E-CF56-4E1C-BE4D-C7BC0FD9B08C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19BBA666-4473-4C6D-BF48-34EF3F09AD7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7DDF6CC-7997-47E7-96D3-8DC10F1D17F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1926DD0-0A9B-4F9D-BB4F-AC7AB0B3F0E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2763A6C7-DBBA-4E2A-917C-B6FF524B9891\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DECDF8-7742-4D58-99FA-100A01748B05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4FD3B1-3A68-4122-AA50-31BFC6C50408\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45790331-CE26-457F-8649-F027703E73EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0BFE2D-5C7B-42E0-B783-8C5907CA8635\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CD993C1-70B6-4ACB-B958-94E7EF973A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C085686C-A0AA-4F56-9E7D-B5CB24B890D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02A5197-06B9-469E-9817-45BB23324042\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EB6BE37-E564-4E42-BE39-36DD301C37A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314209F2-E0A0-4045-8108-8E7215312442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A8ECBB-7E50-4447-88E2-893C1466C251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B8F24A5-F5C3-495F-9AF0-2EE836E0147A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46DE2DE3-F081-4B80-A4DA-C5AB27B3CA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71EF1D77-7838-47DF-B6A2-DBBAC0058FED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76BA4FEA-FEB4-47A9-9DFF-A233CEE03D04\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60DB5A63-E89E-48AB-A846-107EBEC71D67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2181FEEB-D07E-490C-9953-3490D87B63A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36DC41DD-A291-4ECE-84B9-574828AA2A80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"015D1E36-17A1-4413-B1FB-5DF4C36712BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F64CE8F2-22B1-43F8-8934-CBCD2EFBA85D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB15BE8-1B88-4117-AF14-3AA2B54DB323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2CB2728-4CC7-46EA-809B-450A9BB9F884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96638963-D264-49AD-9B77-497C3DA23DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88544BBE-29A1-4622-B3E6-FA4B891A9B5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD658D98-9A4D-4DC2-A935-BB3BF0E0FB2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFF819AF-AC11-4BD9-A070-572836A65FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2EEAC62D-BF2B-40DF-9428-FFBF7CA09471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.55:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"27DFAB04-5C5C-4366-B3FC-C83AAB807F0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36327723-F953-4BD3-A525-930DDCF7931D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.56:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F717B1-CC02-4878-9A78-1584074E81C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D482811-2EF1-47AE-A41C-7532AC6DEF31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.57:rc01:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF26AB67-81F8-4CD2-8E28-BDF9FE2CD58F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D0EE98D-0596-4147-9EC4-F3616BF2B901\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62F15027-0E80-48B7-9ECD-9E7228F0E81B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99904D7E-0046-4481-99B6-01710D4FC848\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB33B4E-E69A-4002-816C-24CCD49682F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42A4FAF1-4B81-47C4-BFB7-6052524A2DA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"686A50C3-93E1-4C3F-8089-322BE26E6317\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C036011A-9AE1-423C-8B73-188B9BA20FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663C6EE5-5B5E-4C0F-9E7F-D0E1DA9AF9EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8051459E-94D3-4D4A-9D40-CC9475DDB00C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42056C63-69A7-43CF-828C-0C3E365702D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6A39A3-7F86-4DC3-B248-859630AFB9A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58377AE3-1C13-4C3F-BC55-8336DAEEF97F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005C2DA4-D00E-4206-851E-9226D66B5F2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97B17602-0D97-469B-A9B1-30AAC8F758F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"857B664A-C6F9-45E3-93EA-C0F53CEF5C46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DFDA458-74E8-4DEF-B524-A4A8672CB66A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3E3BF3-4376-4692-A515-A7B6593F28F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6AF9D5-CE60-4FC9-91AB-E243F0D429E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B1AC712-110D-458F-B650-930C6D45CA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F848FA5-9682-454F-A9DE-671C4401F15F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4B83678-98A1-440E-950C-4A27995C7294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB9EEE31-479A-4370-BF00-C26C1AF502B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95EABD7D-1F18-4FA5-BAA9-F8D69129E531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65B836CA-3740-48B0-966B-21E65EF3D636\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3988FA1B-18D9-46AA-87BA-A6B01D4F4B25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A46409-7AC6-45DB-B92D-29988C445BC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09E2B608-6C70-446F-A3A7-369048D99855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AA00AE0-F447-4361-AA37-0C98BDE491E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21DACE94-FBDC-4A3D-8DD6-E62D18F5EE7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"220A02AF-6ADA-4B75-BC81-40B2D847029A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEB8F61-195E-41DE-90CE-22854055E9D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0F72B91-1F7F-41EB-ABC8-1B50AFEC70EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"111091B9-CBAE-4FC7-8B97-7D2345BFCB45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54C6D9D3-50B2-4A63-B3D1-C76C70F4443E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4110AA74-C69D-45BC-A630-9EE3A2036BD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2DEFD05-10EE-4242-B885-FD1B0DF6CAA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CAA1090-C1C7-43A2-BD44-065572D226B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FD92305-91BF-4984-A029-8FA83CBF1A12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9F9A6DB-19BF-4798-879E-9BD4AD5EFF2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31EE280F-D76D-478B-ADD6-D5F2C7574A2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747314F7-A515-41FF-8095-62A9F05F0DEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1BE9ED0-685B-41F0-A984-D33E7034AEA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3F6AD99-7697-47E5-8301-723C16535C76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B00AD3-D13C-45B5-A13A-9092D40F4A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14222EA8-E8ED-4818-ACB4-C6A13643F210\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22C28DD-5C99-4722-9093-A1E82A2C2808\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93714B71-6331-4F5A-A12A-B4B80CA2FEC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CD562E-1F06-4779-A29C-4069E3C86B16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D83D507-64AF-4158-97B9-1353E2F8EE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC5E39EA-C32E-4E87-9A3F-CCB5144F0E68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.43:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"61B9103F-CD72-4F06-BED1-7AE4AB9E672C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF6249D-5AA8-4EA3-A92A-0E492FE5B811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDE7F259-40A2-4866-8EF8-44A9913EC4EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.45:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA3EED5-F0AB-4C5C-92D7-B84BFDAA31AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03C20A42-6A77-43D4-80D7-332BB2DF1B66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.46:devel:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A0A1B56-0E92-4E81-9B2C-4F9B9D5833EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4CC5DBB-249B-4EED-9F54-E23CB1919ED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.47:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"C10D9119-0FF8-4DFE-8632-A14D9C83CC9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088A1BDB-BB1A-46B5-898B-23311DE27CE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.48:betas:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24CA735-6EA6-41E3-A82D-D443BB47806B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CBAA828-F42A-420F-B17E-6FACF6CD483D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D20664A4-4816-4F57-82BB-F4116FA33A41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64226521-0723-4259-B214-0D2A35CF5FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABEEBFE-A8C8-40D4-97D8-F06676E67478\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.2.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47831D80-33AC-4A13-B92D-3D2CBF215955\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D5DAA1-3632-48D7-A657-4A4C83A119D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5AE8E0-3C11-4EE1-A599-4D70C6A13F1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD36C3B-3C02-488B-B480-EA091D702CA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59BAD272-D4B6-40CE-B5E9-63145E12B638\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EEB311C-766D-4070-A0BE-9CE4593C8F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C185BF59-68E4-49F8-802F-C06FE840FF3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C399B31-B8EC-41C4-B6AB-83BABC474374\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B00AF5F-D4F5-490C-8BF4-2B33EFBF15A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA9AEB1D-0AA7-4842-9CF9-91BFD8B58A4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09150152-5DEA-4FA2-9163-63EAF4D83DEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E5068A-42BE-478B-8C00-FE23B7837DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"023CCFB0-7995-408E-928A-76C5BD9B4924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"493F615D-DB81-48B3-9E74-C32544A01372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2F12925-44F7-4790-8A06-345EB3DCCB71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F5BF226-D62F-4F54-B771-EB108FD256FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2EDBFCB-96DA-4A36-873A-3164975BE997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:1.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACDB15BE-BDD2-4210-B224-A520E8DC7D89\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2FAC325-6EEB-466D-9EBA-8ED4DBC9CFBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7.z:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA856400-1B48-429A-94A0-173B7EEE1EC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"}]}]}],\"references\":[{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2594.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2595.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/p/libpng/bugs/241/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3399\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/26/1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/26/3\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/77304\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securitytracker.com/id/1034393\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2815-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1430\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201611-08\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172620.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172647.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172663.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00033.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2015-11/msg00160.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2594.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2595.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/p/libpng/bugs/241/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng10/1.0.64/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng12/1.2.54/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://sourceforge.net/projects/libpng/files/libpng14/1.4.17/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.debian.org/security/2015/dsa-3399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/26/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2015/10/26/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/77304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1034393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/USN-2815-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2016:1430\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201611-08\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.