CVE-2023-44487

Scores

EPSS Score

0.9450

CVSS

3.x 7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

All CVSS Scores

CVSS 4.0
0.0
CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
0.0

Description

Протокол HTTP/2 допускает отказ в обслуживании (потребление ресурсов сервера), поскольку отмена запроса может быстро сбросить множество потоков, как это было использовано в реальных условиях с августа по октябрь 2023 года.

Sources

astradebianmsrcnvdredhatubuntu

CWEs

CWE-400

Exploits

Exploit ID: CVE-2023-44487

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Reference Links

Vulnerable Software

Type: Configuration

Product: collectd-libpod-stats

Operating System: rhel

Trait:
{
  "fixed": "1.0.4-5.el8ost"
}

Source: redhat

Type: Configuration

Product: collectd-libpod-stats

Operating System: rhel

Trait:
{
  "fixed": "1.0.4-5.el8ost"
}

Source: redhat

Type: Configuration

Product: collectd-libpod-stats

Operating System: rhel

Trait:
{
  "fixed": "1.0.5-6.el8ost"
}

Source: redhat

Type: Configuration

Product: collectd-libpod-stats

Operating System: rhel

Trait:
{
  "fixed": "1.0.5-6.el9ost"
}

Source: redhat

Type: Configuration

Product: cri-o

Operating System: rhel

Trait:
{
  "fixed": "1.25.5-2.rhaos4.12.git0217273.el8"
}

Source: redhat

Type: Configuration

Product: cri-o

Operating System: rhel

Trait:
{
  "fixed": "1.26.4-5.1.rhaos4.13.git969e013.el9"
}

Source: redhat

Type: Configuration

Product: cri-o

Operating System: rhel

Trait:
{
  "fixed": "1.27.1-13.1.rhaos4.14.git956c5f7.el8"
}

Source: redhat

Type: Configuration

Product: cri-o

Operating System: rhel

Trait:
{
  "fixed": "1.24.6-6.1.rhaos4.11.git7f73171.el8_6"
}

Source: redhat

Type: Configuration

Product: dnsdist

Operating System: debian

Trait:
{
  "fixed": "1.8.2-2"
}

Source: debian

Type: Configuration

Product: dnsdist

Operating System: debian buster 10

Trait:
{
  "unaffected": true
}

Source: debian

Type: Configuration

Product: dotnet6

Operating System: ubuntu jammy 22.04

Trait:
{
  "fixed": "6.0.123-0ubuntu1~22.04.1"
}

Source: ubuntu

Type: Configuration

Product: dotnet6

Operating System: ubuntu lunar 23.04

Trait:
{
  "fixed": "6.0.123-0ubuntu1~23.04.1"
}

Source: ubuntu

Type: Configuration

Product: dotnet6.0

Operating System: rhel

Trait:
{
  "fixed": "6.0.123-1.el9_0"
}

Source: redhat

Type: Configuration

Product: dotnet6.0

Operating System: rhel

Trait:
{
  "fixed": "6.0.123-1.el9_2"
}

Source: redhat

Type: Configuration

Product: dotnet6.0

Operating System: rhel

Trait:
{
  "fixed": "6.0.123-1.el8_6"
}

Source: redhat

Type: Configuration

Product: dotnet6.0

Operating System: rhel

Trait:
{
  "fixed": "6.0.123-1.el8_8"
}

Source: redhat

Type: Configuration

Product: dotnet7

Operating System: ubuntu lunar 23.04

Trait:
{
  "fixed": "7.0.112-0ubuntu1~23.04.1"
}

Source: ubuntu

Type: Configuration

Product: dotnet7

Operating System: ubuntu jammy 22.04

Trait:
{
  "fixed": "7.0.112-0ubuntu1~22.04.1"
}

Source: ubuntu

Type: Configuration

Product: dotnet7.0

Operating System: rhel

Trait:
{
  "fixed": "7.0.112-1.el8_8"
}

Source: redhat

Type: Configuration

Product: dotnet7.0

Operating System: rhel

Trait:
{
  "fixed": "7.0.112-1.el9_2"
}

Source: redhat

Type: Configuration

Product: dotnet8

Operating System: ubuntu jammy 22.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: dotnet8.0

Operating System: rhel

Trait:
{
  "fixed": "8.0.100~rc.2-0.1.el9_3"
}

Source: redhat

Type: Configuration

Product: eap7-activemq-artemis

Operating System: rhel

Trait:
{
  "fixed": "2.16.0-17.redhat_00051.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-activemq-artemis

Operating System: rhel

Trait:
{
  "fixed": "2.16.0-17.redhat_00051.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-activemq-artemis

Operating System: rhel

Trait:
{
  "fixed": "2.16.0-17.redhat_00051.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-infinispan

Operating System: rhel

Trait:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-infinispan

Operating System: rhel

Trait:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-infinispan

Operating System: rhel

Trait:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-jbossws-cxf

Operating System: rhel

Trait:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-jbossws-cxf

Operating System: rhel

Trait:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-jbossws-cxf

Operating System: rhel

Trait:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty-transport-native-epoll

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty-transport-native-epoll

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-netty-transport-native-epoll

Operating System: rhel

Trait:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-undertow

Operating System: rhel

Trait:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el8eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly

Operating System: rhel

Trait:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el9eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly-transaction-client

Operating System: rhel

Trait:
{
  "fixed": "1.1.16-1.Final_redhat_00001.1.el7eap"
}

Source: redhat

Type: Configuration

Product: eap7-wildfly-transaction-client

Operating System: rhel

Trait:
{
  "fixed": "1.1.16-1.Final_redhat_00001.1.el8eap"
}

Source: redhat

Type: Configuration

Product: etcd

Operating System: rhel

Trait:
{
  "fixed": "3.4.26-3.el9ost"
}

Source: redhat

Type: Configuration

Product: etcd

Operating System: rhel

Trait:
{
  "fixed": "3.3.23-15.el8ost"
}

Source: redhat

Type: Configuration

Product: etcd

Operating System: rhel

Trait:
{
  "fixed": "3.3.23-15.el8ost"
}

Source: redhat

Type: Configuration

Product: foreman_ygg_worker

Operating System: rhel

Trait:
{
  "fixed": "0.2.2-1.el7sat"
}

Source: redhat

Type: Configuration

Product: foreman_ygg_worker

Operating System: rhel

Trait:
{
  "fixed": "0.2.2-1.el8sat"
}

Source: redhat

Type: Configuration

Product: foreman_ygg_worker

Operating System: rhel

Trait:
{
  "fixed": "0.2.2-1.el9sat"
}

Source: redhat

Type: Configuration

Product: go-toolset-1.19

Operating System: rhel

Trait:
{
  "fixed": "1.19.13-1.el7_9"
}

Source: redhat

Type: Configuration

Product: go-toolset-1.19-golang

Operating System: rhel

Trait:
{
  "fixed": "1.19.13-2.el7_9"
}

Source: redhat

Type: Configuration

Product: golang

Operating System: rhel

Trait:
{
  "fixed": "1.19.13-1.el9_2"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "9.0.9-4.el9_2"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.3.6-6.el8_4"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.3.6-6.el8_4"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.3.6-6.el8_4"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.5.11-6.el9_0"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.5.11-4.el8_6"
}

Source: redhat

Type: Configuration

Product: grafana

Operating System: rhel

Trait:
{
  "fixed": "7.5.15-5.el8_8"
}

Source: redhat

Type: Configuration

Product: grpc

Operating System: debian

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: h2o

Operating System: debian bullseye 11

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: h2o

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: h2o

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: h2o

Operating System: debian

Trait:
{
  "fixed": "2.2.5+dfsg2-8"
}

Source: debian

Type: Configuration

Product: haproxy

Operating System: ubuntu jammy 22.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: debian

Trait:
{
  "fixed": "1.8.13-1"
}

Source: debian

Type: Configuration

Product: haproxy

Operating System: ubuntu focal 20.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: ubuntu lunar 23.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: haproxy

Operating System: astra 1.6.8

Trait:
{
  "unaffected": true
}

Source: astra

Type: Configuration

Product: haproxy

Operating System: astra 1.6.8

Trait:
{
  "unaffected": true
}

Source: astra

Type: Configuration

Product: helm

Operating System: rhel

Trait:
{
  "fixed": "3.13.2-35.el9"
}

Source: redhat

Type: Configuration

Product: httpd24-nghttp2

Operating System: rhel

Trait:
{
  "fixed": "1.7.1-11.el7"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-nghttp2

Operating System: rhel

Trait:
{
  "fixed": "1.43.0-12.el8jbcs"
}

Source: redhat

Type: Configuration

Product: jbcs-httpd24-nghttp2

Operating System: rhel

Trait:
{
  "fixed": "1.43.0-12.el7jbcs"
}

Source: redhat

Type: Configuration

Product: jenkins

Operating System: rhel

Trait:
{
  "fixed": "2.426.3.1706516352-3.el8"
}

Source: redhat

Type: Configuration

Product: jenkins

Operating System: rhel

Trait:
{
  "fixed": "2.414.3.1698292201-3.el8"
}

Source: redhat

Type: Configuration

Product: jenkins

Operating System: rhel

Trait:
{
  "fixed": "2.414.3.1699356615-3.el8"
}

Source: redhat

Type: Configuration

Product: jenkins-2-plugins

Operating System: rhel

Trait:
{
  "fixed": "4.14.1699356715-1.el8"
}

Source: redhat

Type: Configuration

Product: jetty9

Operating System: debian

Trait:
{
  "fixed": "9.4.53-1"
}

Source: debian

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{
  "fixed": "9.0.62-16.redhat_00014.1.el8jws"
}

Source: redhat

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{
  "fixed": "9.0.62-16.redhat_00014.1.el9jws"
}

Source: redhat

Type: Configuration

Product: jws5-tomcat

Operating System: rhel

Trait:
{
  "fixed": "9.0.62-16.redhat_00014.1.el7jws"
}

Source: redhat

Type: Configuration

Product: kubevirt

Operating System: rhel

Trait:
{
  "fixed": "4.13.6-1596.el8"
}

Source: redhat

Type: Configuration

Product: kubevirt

Operating System: rhel

Trait:
{
  "fixed": "4.13.6-1596.el7"
}

Source: redhat

Type: Configuration

Product: kubevirt

Operating System: rhel

Trait:
{
  "fixed": "4.13.6-1596.el9"
}

Source: redhat

Type: Configuration

Product: microshift

Operating System: rhel

Trait:
{
  "fixed": "4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9"
}

Source: redhat

Type: Configuration

Product: netty

Operating System: ubuntu focal 20.04

Trait:
{
  "fixed": "1:4.1.45-1ubuntu0.2"
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu jammy 22.04

Trait:
{
  "fixed": "1:4.1.48-4+deb11u2build0.22.04.1"
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu kinetic 22.10

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: netty

Operating System: debian

Trait:
{
  "fixed": "1:4.1.48-8"
}

Source: debian

Type: Configuration

Product: nghttp2

Operating System: rhel 8.1

Trait:
{
  "fixed": "1.33.0-3.el8_1.2"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: ubuntu jammy 22.04

Trait:
{
  "fixed": "1.43.0-1ubuntu0.1"
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: rhel 8.4

Trait:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 8.2

Trait:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: ubuntu focal 20.04

Trait:
{
  "fixed": "1.40.0-1ubuntu0.2"
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: rhel 8

Trait:
{
  "fixed": "1.33.0-5.el8_8"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 9

Trait:
{
  "fixed": "1.43.0-5.el9_3.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: debian

Trait:
{
  "fixed": "1.57.0-1"
}

Source: debian

Type: Configuration

Product: nghttp2

Operating System: rhel 8.4

Trait:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: ubuntu lunar 23.04

Trait:
{
  "fixed": "1.52.0-1ubuntu0.1"
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nghttp2

Operating System: rhel 9

Trait:
{
  "fixed": "1.43.0-5.el9_2.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 8.4

Trait:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 8.6

Trait:
{
  "fixed": "1.33.0-4.el8_6.1"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 9.0

Trait:
{
  "fixed": "1.43.0-5.el9_0.2"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 8.2

Trait:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Source: redhat

Type: Configuration

Product: nghttp2

Operating System: rhel 8.2

Trait:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.22-9030020231017214601.9"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: ubuntu focal 20.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.20.1-14.el9_2.1"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: ubuntu lunar 23.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: debian

Trait:
{
  "fixed": "1.24.0-2"
}

Source: debian

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.20.1-10.el9_0.1"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.22-9020020231011212752.9"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.20-8080020231012034601.63b34585"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.22-8080020231011224613.63b34585"
}

Source: redhat

Type: Configuration

Product: nginx

Operating System: ubuntu jammy 22.04

Trait:
{
  "unaffected": true
}

Source: ubuntu

Type: Configuration

Product: nginx

Operating System: rhel

Trait:
{
  "fixed": "1.20-8060020231011172032.ad008a3a"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "16.20.2-3.el9_0"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "16-8090020240315081818.a75119d5"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "20-8090020231019152822.a75119d5"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "16-8060020231013145914.ad008a3a"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "18-8080020231015215042.63b34585"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "16-8080020231013145100.63b34585"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "16.20.2-3.el9_2"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: rhel

Trait:
{
  "fixed": "18-9020020231015221156.rhel9"
}

Source: redhat

Type: Configuration

Product: nodejs

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nodejs

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: nodejs

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: openshift

Operating System: rhel

Trait:
{
  "fixed": "4.12.0-202310132326.p0.g20cda61.assembly.stream.el8"
}

Source: redhat

Type: Configuration

Product: openshift

Operating System: rhel

Trait:
{
  "fixed": "4.14.0-202310210404.p0.gf67aeb3.assembly.stream.el8"
}

Source: redhat

Type: Configuration

Product: openshift

Operating System: rhel

Trait:
{
  "fixed": "4.11.0-202310140343.p0.gec2a592.assembly.stream.el8"
}

Source: redhat

Type: Configuration

Product: openshift-clients

Operating System: rhel

Trait:
{
  "fixed": "4.14.0-202310191146.p0.g0c63f9d.assembly.stream.el9"
}

Source: redhat

Type: Configuration

Product: openshift-gitops-kam

Operating System: rhel

Trait:
{
  "fixed": "1.8.6-10.el8"
}

Source: redhat

Type: Configuration

Product: openshift-gitops-kam

Operating System: rhel

Trait:
{
  "fixed": "1.9.3-32.el8"
}

Source: redhat

Type: Configuration

Product: openshift-pipelines-client

Operating System: rhel

Trait:
{
  "fixed": "1.11.2-11148.el8"
}

Source: redhat

Type: Configuration

Product: openshift-pipelines-client

Operating System: rhel

Trait:
{
  "fixed": "1.12.1-11260.el8"
}

Source: redhat

Type: Configuration

Product: openshift-pipelines-client

Operating System: rhel

Trait:
{
  "fixed": "1.10.6-11031.el8"
}

Source: redhat

Type: Configuration

Product: openshift-serverless-clients

Operating System: rhel

Trait:
{
  "fixed": "1.9.2-4.el8"
}

Source: redhat

Type: Configuration

Product: python-octavia-tests-tempest

Operating System: rhel

Trait:
{
  "fixed": "1.3.0-1.20210528004838.0ae7f10.el8ost"
}

Source: redhat

Type: Configuration

Product: python-octavia-tests-tempest

Operating System: rhel

Trait:
{
  "fixed": "1.9.0-1.20230509101018.el9ost"
}

Source: redhat

Type: Configuration

Product: python-octavia-tests-tempest

Operating System: rhel

Trait:
{
  "fixed": "1.4.1-2.20230111145026.f7718ef.el8ost"
}

Source: redhat

Type: Configuration

Product: receptor

Operating System: rhel

Trait:
{
  "fixed": "1.4.2-1.el8ap"
}

Source: redhat

Type: Configuration

Product: receptor

Operating System: rhel

Trait:
{
  "fixed": "1.4.2-1.el9ap"
}

Source: redhat

Type: Configuration

Product: rh-dotnet60-dotnet

Operating System: rhel

Trait:
{
  "fixed": "6.0.123-1.el7_9"
}

Source: redhat

Type: Configuration

Product: rh-nginx120-nginx

Operating System: rhel

Trait:
{
  "fixed": "1.20.1-1.el7.1"
}

Source: redhat

Type: Configuration

Product: rh-nodejs14-nodejs

Operating System: rhel

Trait:
{
  "fixed": "14.21.3-5.el7"
}

Source: redhat

Type: Configuration

Product: rh-sso7-keycloak

Operating System: rhel

Trait:
{
  "fixed": "18.0.11-2.redhat_00001.1.el9sso"
}

Source: redhat

Type: Configuration

Product: rh-sso7-keycloak

Operating System: rhel

Trait:
{
  "fixed": "18.0.11-2.redhat_00001.1.el8sso"
}

Source: redhat

Type: Configuration

Product: rh-sso7-keycloak

Operating System: rhel

Trait:
{
  "fixed": "18.0.11-2.redhat_00001.1.el7sso"
}

Source: redhat

Type: Configuration

Product: rh-varnish6-varnish

Operating System: rhel

Trait:
{
  "fixed": "6.0.8-2.el7.3"
}

Source: redhat

Type: Configuration

Product: rhc-worker-script

Operating System: rhel 7

Trait:
{
  "fixed": "0.5-1.el7_9"
}

Source: redhat

Type: Configuration

Product: skupper-cli

Operating System: rhel

Trait:
{
  "fixed": "1.4.3-4.el8"
}

Source: redhat

Type: Configuration

Product: skupper-cli

Operating System: rhel

Trait:
{
  "fixed": "1.4.3-4.el9"
}

Source: redhat

Type: Configuration

Product: skupper-router

Operating System: rhel

Trait:
{
  "fixed": "2.4.3-1.el9"
}

Source: redhat

Type: Configuration

Product: skupper-router

Operating System: rhel

Trait:
{
  "fixed": "2.4.3-1.el8"
}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{
  "fixed": "9.0.62-11.el9_2.3"
}

Source: redhat

Type: Configuration

Product: tomcat

Operating System: rhel

Trait:
{
  "fixed": "9.0.62-5.el8_8.2"
}

Source: redhat

Type: Configuration

Product: tomcat10

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: debian

Trait:
{
  "fixed": "10.1.14-1"
}

Source: debian

Type: Configuration

Product: tomcat8

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat8

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: debian

Trait:
{
  "fixed": "9.0.70-2"
}

Source: debian

Type: Configuration

Product: tomcat9

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: toolbox

Operating System: rhel

Trait:
{
  "fixed": "0.0.99.3-10.el9_2"
}

Source: redhat

Type: Configuration

Product: toolbox

Operating System: rhel

Trait:
{
  "fixed": "0.0.99.3-4.el9_0"
}

Source: redhat

Type: Configuration

Product: trafficserver

Operating System: ubuntu xenial 16.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: trafficserver

Operating System: debian

Trait:
{
  "fixed": "9.2.3+ds-1"
}

Source: debian

Type: Configuration

Product: trafficserver

Operating System: ubuntu trusty 14.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: trafficserver

Operating System: ubuntu lunar 23.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: trafficserver

Operating System: ubuntu bionic 18.04

Trait:
{
  "unfixed": true
}

Source: ubuntu

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8060020231019105116.ad008a3a"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8010020231019161354.c27ad7f8"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: debian bullseye 11

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: varnish

Operating System: debian

Trait:
{
  "fixed": "7.5.0-1"
}

Source: debian

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6.6.2-2.el9_0.2"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6.6.2-3.el9_2.1"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: debian bookworm 12

Trait:
{
  "unfixed": true
}

Source: debian

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8080020231018193953.63b34585"
}

Source: redhat

Type: Configuration

Product: varnish

Operating System: rhel

Trait:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Source: redhat

Type: Configuration

Product: yggdrasil

Operating System: rhel

Trait:
{
  "fixed": "0.2.3-1.el8sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil

Operating System: rhel

Trait:
{
  "fixed": "0.2.3-1.el7sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil

Operating System: rhel

Trait:
{
  "fixed": "0.2.3-1.el9sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil-worker-forwarder

Operating System: rhel

Trait:
{
  "fixed": "0.0.3-1.el8sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil-worker-forwarder

Operating System: rhel

Trait:
{
  "fixed": "0.0.3-1.el7sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil-worker-forwarder

Operating System: rhel

Trait:
{
  "fixed": "0.0.3-1.el8sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil-worker-forwarder

Operating System: rhel

Trait:
{
  "fixed": "0.0.3-1.el8sat"
}

Source: redhat

Type: Configuration

Product: yggdrasil-worker-forwarder

Operating System: rhel

Trait:
{
  "fixed": "0.0.3-1.el8sat"
}

Source: redhat

Type: Configuration

Vendor: akka

Product: http_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.5.3",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: amazon

Product: opensearch_data_prepper

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.5.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: apache

Product: apisix

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.6.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.1.9",
      "versionStartIncluding": "8.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.3",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: apache

Product: solr

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.4.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: apache

Product: tomcat

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "8.5.93",
      "versionStartIncluding": "8.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "9.0.80",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "10.1.13",
      "versionStartIncluding": "10.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: apache

Product: traffic_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.6.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.1.9",
      "versionStartIncluding": "8.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.3",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: apple

Product: swiftnio_http/2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
      "versionEndExcluding": "1.28.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: caddyserver

Product: caddy

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.7.5",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: connected_mobile_experiences

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: crosswork_data_gateway

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: crosswork_zero_touch_provisioning

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: data_center_network_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: enterprise_chat_and_email

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: expressway

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: firepower_threat_defense

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: fog_director

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: ios_xe

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: ios_xr

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: iot_field_network_director

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: nx-os

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.2\\(7\\)",
          "vulnerable": true
        },
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.3\\(5\\)",
          "versionStartIncluding": "10.3\\(1\\)",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: nx-os

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.2\\(7\\)",
          "vulnerable": true
        },
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.3\\(5\\)",
          "versionStartIncluding": "10.3\\(1\\)",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: prime_access_registrar

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: prime_cable_provisioning

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: prime_infrastructure

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: prime_network_registrar

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: secure_dynamic_attributes_connector

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: secure_malware_analytics

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: secure_web_appliance_firmware

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "15.1.0",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: telepresence_video_communication_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: ultra_cloud_core_-_policy_control_function

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: ultra_cloud_core_-_serving_gateway_function

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: ultra_cloud_core_-_session_management_function

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: unified_attendant_console_advanced

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: unified_contact_center_domain_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: unified_contact_center_enterprise

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: unified_contact_center_enterprise_-_live_data_server

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: cisco

Product: unified_contact_center_management_portal

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: debian

Product: debian_linux

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: dena

Product: h2o

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-10",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: eclipse

Product: jetty

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.4.53",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17",
      "versionStartIncluding": "10.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.0.17",
      "versionStartIncluding": "11.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.0.2",
      "versionStartIncluding": "12.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: envoyproxy

Product: envoy

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_access_policy_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_advanced_firewall_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_advanced_web_application_firewall

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_analytics

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_application_acceleration_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_application_security_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_application_visibility_and_reporting

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_carrier-grade_nat

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_ddos_hybrid_defender

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_domain_name_system

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_fraud_protection_service

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_global_traffic_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_link_controller

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_local_traffic_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_next

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_next_service_proxy_for_kubernetes

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_policy_enforcement_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_ssl_orchestrator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_webaccelerator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: big-ip_websafe

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: nginx

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: nginx_ingress_controller

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: f5

Product: nginx_plus

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: facebook

Product: proxygen

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023.10.16.00",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: fedoraproject

Product: fedora

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: golang

Product: go

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: golang

Product: http2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: golang

Product: networking

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: grpc

Product: grpc

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "1.56.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*",
      "versionEndIncluding": "1.59.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "1.58.3",
      "versionStartIncluding": "1.58.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: ietf

Product: http

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: istio

Product: istio

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.18.3",
      "versionStartIncluding": "1.18.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.19.1",
      "versionStartIncluding": "1.19.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: jenkins

Product: jenkins

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
      "versionEndIncluding": "2.414.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
      "versionEndIncluding": "2.427",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: kazu-yamamoto

Product: http2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.2.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: konghq

Product: kong_gateway

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
      "versionEndExcluding": "3.4.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: linecorp

Product: armeria

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.26.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: linkerd

Product: linkerd

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
      "versionEndIncluding": "2.12.5",
      "versionStartIncluding": "2.12.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: .net

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: asp.net_core

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: azure_kubernetes_service

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: cbl-mariner

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-11",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: visual_studio_2022

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_10_1607

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_10_1809

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_10_21h2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_10_22h2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_11_21h2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_11_22h2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_server_2016

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_server_2019

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: microsoft

Product: windows_server_2022

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: astra_control_center

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netapp

Product: oncommand_insight

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: netty

Product: netty

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.100",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: nghttp2

Product: nghttp2

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.57.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: nodejs

Product: node.js

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
      "versionEndExcluding": "18.18.2",
      "versionStartIncluding": "18.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "20.8.1",
      "versionStartIncluding": "20.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: openresty

Product: openresty

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.4.3",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: projectcontour

Product: contour

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
      "versionEndExcluding": "2023-10-11",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: 3scale_api_management_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: advanced_cluster_management_for_kubernetes

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: advanced_cluster_security

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: ansible_automation_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: build_of_optaplanner

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: build_of_quarkus

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: ceph_storage

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: cert-manager_operator_for_red_hat_openshift

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: certification_for_red_hat_enterprise_linux

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: cost_management

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: cryostat

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: decision_manager

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: enterprise_linux

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: fence_agents_remediation_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: integration_camel_for_spring_boot

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: integration_camel_k

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: integration_service_registry

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_a-mq

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_a-mq_streams

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_core_services

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_data_grid

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_enterprise_application_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: jboss_fuse

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: logging_subsystem_for_red_hat_openshift

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: machine_deletion_remediation_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: migration_toolkit_for_applications

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: migration_toolkit_for_containers

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: migration_toolkit_for_virtualization

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: network_observability_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: node_healthcheck_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: node_maintenance_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_api_for_data_protection

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_container_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_container_platform_assisted_installer

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_data_science

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_dev_spaces

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_developer_tools_and_services

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_distributed_tracing

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_gitops

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_pipelines

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_sandboxed_containers

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_secondary_scheduler_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_serverless

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_service_mesh

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openshift_virtualization

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: openstack_platform

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: process_automation

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: quay

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: run_once_duration_override_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: satellite

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: self_node_remediation_operator

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: service_interconnect

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: service_telemetry_framework

Operating System: * * *

Trait:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: single_sign-on

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: support_for_spring_boot

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: redhat

Product: web_terminal

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: traefik

Product: traefik

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.10.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Configuration

Vendor: varnish_cache_project

Product: varnish_cache

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-10",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Source: nvd

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7515

Operating System: Windows 14393 build 7515

Identifier: KB5046612

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3692

Operating System: Windows 20348 build 3692

Identifier: KB5058385

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5053643

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5050081

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7785

Operating System: Windows 14393 build 7785

Identifier: KB5052006

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058921

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7159

Operating System: Windows 14393 build 7159

Identifier: KB5040434

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6981

Operating System: Windows 14393 build 6981

Identifier: KB5037763

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.8148

Operating System: Windows 14393 build 8148

Identifier: KB5061010

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7876

Operating System: Windows 14393 build 7876

Identifier: KB5053594

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6897

Operating System: Windows 14393 build 6897

Identifier: KB5036899

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7699

Operating System: Windows 14393 build 7699

Identifier: KB5049993

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7969

Operating System: Windows 14393 build 7969

Identifier: KB5055521

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6709

Operating System: Windows 14393 build 6709

Identifier: KB5034767

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7606

Operating System: Windows 14393 build 7606

Identifier: KB5048671

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6529

Operating System: Windows 14393 build 6529

Identifier: KB5033373

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7070

Operating System: Windows 14393 build 7070

Identifier: KB5039214

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7259

Operating System: Windows 14393 build 7259

Identifier: KB5041773

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6614

Operating System: Windows 14393 build 6614

Identifier: KB5034119

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6796

Operating System: Windows 14393 build 6796

Identifier: KB5035855

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7336

Operating System: Windows 14393 build 7336

Identifier: KB5043051

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6452

Operating System: Windows 14393 build 6452

Identifier: KB5032197

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.8066

Operating System: Windows 14393 build 8066

Identifier: KB5058383

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19041.3570

Operating System: Windows 19041 build 3570

Identifier: KB5031356

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5487

Operating System: Windows 19044 build 5487

Identifier: KB5051974

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5039299

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5046714

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5371

Operating System: Windows 19044 build 5371

Identifier: KB5049981

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5035941

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5055612

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5036979

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19041.3803

Operating System: Windows 19041 build 3803

Identifier: KB5033372

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5061768

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5011

Operating System: Windows 19044 build 5011

Identifier: KB5044273

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5034843

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5040525

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5041582

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5045594

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5052077

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.3693

Operating System: Windows 19044 build 3693

Identifier: KB5032189

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4291

Operating System: Windows 19044 build 4291

Identifier: KB5036892

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5034203

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4529

Operating System: Windows 19044 build 4529

Identifier: KB5039211

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4046

Operating System: Windows 19044 build 4046

Identifier: KB5034763

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5965

Operating System: Windows 19044 build 5965

Identifier: KB5060533

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 6.0.25

Operating System: Windows 0 build 25

Identifier: KB5032883

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5037423

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.7428

Operating System: Windows 14393 build 7428

Identifier: KB5044293

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.3930

Operating System: Windows 19044 build 3930

Identifier: KB5034122

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5131

Operating System: Windows 19044 build 5131

Identifier: KB5046613

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4412

Operating System: Windows 19044 build 4412

Identifier: KB5037768

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5061979

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5608

Operating System: Windows 19044 build 5608

Identifier: KB5053606

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4894

Operating System: Windows 19044 build 4894

Identifier: KB5043064

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4651

Operating System: Windows 19044 build 4651

Identifier: KB5040427

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5031445

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5037849

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5043131

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4780

Operating System: Windows 19044 build 4780

Identifier: KB5041580

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.4170

Operating System: Windows 19044 build 4170

Identifier: KB5035845

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.14393.6351

Operating System: Windows 14393 build 6351

Identifier: KB5031362

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5032278

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5854

Operating System: Windows 19044 build 5854

Identifier: KB5058379

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5737

Operating System: Windows 19044 build 5737

Identifier: KB5055518

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.2428

Operating System: Windows 22621 build 2428

Identifier: KB5031354

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5035942

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4602

Operating System: Windows 22621 build 4602

Identifier: KB5048685

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4037

Operating System: Windows 22621 build 4037

Identifier: KB5041585

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3447

Operating System: Windows 22621 build 3447

Identifier: KB5036893

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5053657

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.5039

Operating System: Windows 22621 build 5039

Identifier: KB5053602

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5037853

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5036980

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5032288

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22631.4169

Operating System: Windows 22631 build 4169

Identifier: KB5043076

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4890

Operating System: Windows 22621 build 4890

Identifier: KB5051989

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058502

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.5189

Operating System: Windows 22621 build 5189

Identifier: KB5055528

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5052094

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5046732

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3155

Operating System: Windows 22621 build 3155

Identifier: KB5034765

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3007

Operating System: Windows 22621 build 3007

Identifier: KB5034123

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5031455

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5044380

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5034848

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5055629

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3296

Operating System: Windows 22621 build 3296

Identifier: KB5035853

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3880

Operating System: Windows 22621 build 3880

Identifier: KB5040442

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.5472

Operating System: Windows 22621 build 5472

Identifier: KB5060999

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058481

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3593

Operating System: Windows 22621 build 3593

Identifier: KB5037771

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5062170

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5050092

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4460

Operating System: Windows 22621 build 4460

Identifier: KB5046633

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5040527

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4751

Operating System: Windows 22621 build 4751

Identifier: KB5050021

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058919

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5041587

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5043145

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5039302

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.2715

Operating System: Windows 22621 build 2715

Identifier: KB5032190

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5034204

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.4317

Operating System: Windows 22621 build 4317

Identifier: KB5044285

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.3737

Operating System: Windows 22621 build 3737

Identifier: KB5039212

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.2861

Operating System: Windows 22621 build 2861

Identifier: KB5033375

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2538

Operating System: Windows 22000 build 2538

Identifier: KB5031358

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2836

Operating System: Windows 22000 build 2836

Identifier: KB5035854

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2600

Operating System: Windows 22000 build 2600

Identifier: KB5032192

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2713

Operating System: Windows 22000 build 2713

Identifier: KB5034121

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2652

Operating System: Windows 22000 build 2652

Identifier: KB5033369

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.3147

Operating System: Windows 22000 build 3147

Identifier: KB5041592

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2960

Operating System: Windows 22000 build 2960

Identifier: KB5037770

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.3260

Operating System: Windows 22000 build 3260

Identifier: KB5044280

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2899

Operating System: Windows 22000 build 2899

Identifier: KB5036894

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.2777

Operating System: Windows 22000 build 2777

Identifier: KB5034766

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.3197

Operating System: Windows 22000 build 3197

Identifier: KB5043067

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.3019

Operating System: Windows 22000 build 3019

Identifier: KB5039213

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22000.3079

Operating System: Windows 22000 build 3079

Identifier: KB5040431

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2031

Operating System: Windows 20348 build 2031

Identifier: KB5031364

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2402

Operating System: Windows 20348 build 2402

Identifier: KB5036909

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2113

Operating System: Windows 20348 build 2113

Identifier: KB5032198

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2700

Operating System: Windows 20348 build 2700

Identifier: KB5042881

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3207

Operating System: Windows 20348 build 3207

Identifier: KB5051979

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3091

Operating System: Windows 20348 build 3091

Identifier: KB5049983

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5047767

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5052819

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5037422

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2159

Operating System: Windows 20348 build 2159

Identifier: KB5033118

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5061906

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2655

Operating System: Windows 20348 build 2655

Identifier: KB5041160

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2322

Operating System: Windows 20348 build 2322

Identifier: KB5034770

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5059092

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 6.0.24

Operating System: Windows 0 build 24

Identifier: KB5032874

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 6.0.26

Operating System: Windows 0 build 26

Identifier: KB5033733

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.22621.5335

Operating System: Windows 22621 build 5335

Identifier: KB5058405

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2340

Operating System: Windows 20348 build 2340

Identifier: KB5035857

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2461

Operating System: Windows 20348 build 2461

Identifier: KB5037782

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2966

Operating System: Windows 20348 build 2966

Identifier: KB5048654

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3807

Operating System: Windows 20348 build 3807

Identifier: KB5060526

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058920

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5041054

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2849

Operating System: Windows 20348 build 2849

Identifier: KB5046616

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2582

Operating System: Windows 20348 build 2582

Identifier: KB5040437

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3328

Operating System: Windows 20348 build 3328

Identifier: KB5053603

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.3453

Operating System: Windows 20348 build 3453

Identifier: KB5055526

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2762

Operating System: Windows 20348 build 2762

Identifier: KB5044281

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.4974

Operating System: Windows 17763 build 4974

Identifier: KB5031361

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6189

Operating System: Windows 17763 build 6189

Identifier: KB5041578

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6775

Operating System: Windows 17763 build 6775

Identifier: KB5050008

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5059091

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6532

Operating System: Windows 17763 build 6532

Identifier: KB5046615

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5039705

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5820

Operating System: Windows 17763 build 5820

Identifier: KB5037765

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5458

Operating System: Windows 17763 build 5458

Identifier: KB5034768

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.7314

Operating System: Windows 17763 build 7314

Identifier: KB5058392

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6293

Operating System: Windows 17763 build 6293

Identifier: KB5043050

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5058922

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.7009

Operating System: Windows 17763 build 7009

Identifier: KB5053596

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5206

Operating System: Windows 17763 build 5206

Identifier: KB5033371

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5329

Operating System: Windows 17763 build 5329

Identifier: KB5034127

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5696

Operating System: Windows 17763 build 5696

Identifier: KB5036896

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5061978

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.7136

Operating System: Windows 17763 build 7136

Identifier: KB5055519

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6414

Operating System: Windows 17763 build 6414

Identifier: KB5044277

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6893

Operating System: Windows 17763 build 6893

Identifier: KB5052000

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.7434

Operating System: Windows 17763 build 7434

Identifier: KB5060531

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5936

Operating System: Windows 17763 build 5936

Identifier: KB5039217

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Operating System: Windows

Identifier: KB5037425

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5122

Operating System: Windows 17763 build 5122

Identifier: KB5032196

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.5576

Operating System: Windows 17763 build 5576

Identifier: KB5035849

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6054

Operating System: Windows 17763 build 6054

Identifier: KB5040430

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.17763.6659

Operating System: Windows 17763 build 6659

Identifier: KB5048661

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 7.0.13

Operating System: Windows 0 build 13

Identifier: KB5032875

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 7.0.15

Operating System: Windows 0 build 15

Identifier: KB5033734

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 7.0.14

Operating System: Windows 0 build 14

Identifier: KB5032884

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2227

Operating System: Windows 20348 build 2227

Identifier: KB5034129

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.20348.2527

Operating System: Windows 20348 build 2527

Identifier: KB5039227

Source: msrc

Type: Windows KB

Vendor: Microsoft

Product: Windows

Version: 10.0.19044.5247

Operating System: Windows 19044 build 5247

Identifier: KB5048652

Source: msrc