CVE-2023-44487

Оценки

Оценка EPSS

0.9450

CVSS

3.x 7.5

Вектор: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Все оценки CVSS

CVSS 4.0
0.0
CVSS 3.x
7.5

Вектор: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVSS 2.0
0.0

Описание

Протокол HTTP/2 допускает отказ в обслуживании (потребление ресурсов сервера), поскольку отмена запроса может быстро сбросить множество потоков, как это было использовано в реальных условиях с августа по октябрь 2023 года.

Источники

astradebianmsrcnvdredhatubuntu

CWE

CWE-400

Эксплойты

ID эксплойта: CVE-2023-44487

Источник: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Справочные ссылки

Уязвимое ПО

Тип: Конфигурация

Продукт: collectd-libpod-stats

Операционная система: rhel

Характеристика:
{
  "fixed": "1.0.4-5.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: collectd-libpod-stats

Операционная система: rhel

Характеристика:
{
  "fixed": "1.0.4-5.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: collectd-libpod-stats

Операционная система: rhel

Характеристика:
{
  "fixed": "1.0.5-6.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: collectd-libpod-stats

Операционная система: rhel

Характеристика:
{
  "fixed": "1.0.5-6.el9ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: cri-o

Операционная система: rhel

Характеристика:
{
  "fixed": "1.25.5-2.rhaos4.12.git0217273.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: cri-o

Операционная система: rhel

Характеристика:
{
  "fixed": "1.26.4-5.1.rhaos4.13.git969e013.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: cri-o

Операционная система: rhel

Характеристика:
{
  "fixed": "1.27.1-13.1.rhaos4.14.git956c5f7.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: cri-o

Операционная система: rhel

Характеристика:
{
  "fixed": "1.24.6-6.1.rhaos4.11.git7f73171.el8_6"
}

Источник: redhat

Тип: Конфигурация

Продукт: dnsdist

Операционная система: debian

Характеристика:
{
  "fixed": "1.8.2-2"
}

Источник: debian

Тип: Конфигурация

Продукт: dnsdist

Операционная система: debian buster 10

Характеристика:
{
  "unaffected": true
}

Источник: debian

Тип: Конфигурация

Продукт: dotnet6

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "fixed": "6.0.123-0ubuntu1~22.04.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: dotnet6

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "fixed": "6.0.123-0ubuntu1~23.04.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: dotnet6.0

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.123-1.el9_0"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet6.0

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.123-1.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet6.0

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.123-1.el8_6"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet6.0

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.123-1.el8_8"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet7

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "fixed": "7.0.112-0ubuntu1~23.04.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: dotnet7

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "fixed": "7.0.112-0ubuntu1~22.04.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: dotnet7.0

Операционная система: rhel

Характеристика:
{
  "fixed": "7.0.112-1.el8_8"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet7.0

Операционная система: rhel

Характеристика:
{
  "fixed": "7.0.112-1.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: dotnet8

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: dotnet8.0

Операционная система: rhel

Характеристика:
{
  "fixed": "8.0.100~rc.2-0.1.el9_3"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-activemq-artemis

Операционная система: rhel

Характеристика:
{
  "fixed": "2.16.0-17.redhat_00051.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-activemq-artemis

Операционная система: rhel

Характеристика:
{
  "fixed": "2.16.0-17.redhat_00051.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-activemq-artemis

Операционная система: rhel

Характеристика:
{
  "fixed": "2.16.0-17.redhat_00051.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-infinispan

Операционная система: rhel

Характеристика:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-infinispan

Операционная система: rhel

Характеристика:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-infinispan

Операционная система: rhel

Характеристика:
{
  "fixed": "11.0.18-1.Final_redhat_00001.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-jbossws-cxf

Операционная система: rhel

Характеристика:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-jbossws-cxf

Операционная система: rhel

Характеристика:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-jbossws-cxf

Операционная система: rhel

Характеристика:
{
  "fixed": "5.4.9-1.Final_redhat_00001.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty-transport-native-epoll

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty-transport-native-epoll

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-netty-transport-native-epoll

Операционная система: rhel

Характеристика:
{
  "fixed": "4.1.94-2.Final_redhat_00003.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.28-1.SP1_redhat_00001.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-undertow

Операционная система: rhel

Характеристика:
{
  "fixed": "2.2.26-2.SP2_redhat_00001.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.14-5.GA_redhat_00002.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly

Операционная система: rhel

Характеристика:
{
  "fixed": "7.4.13-10.GA_redhat_00002.1.el9eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly-transaction-client

Операционная система: rhel

Характеристика:
{
  "fixed": "1.1.16-1.Final_redhat_00001.1.el7eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: eap7-wildfly-transaction-client

Операционная система: rhel

Характеристика:
{
  "fixed": "1.1.16-1.Final_redhat_00001.1.el8eap"
}

Источник: redhat

Тип: Конфигурация

Продукт: etcd

Операционная система: rhel

Характеристика:
{
  "fixed": "3.4.26-3.el9ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: etcd

Операционная система: rhel

Характеристика:
{
  "fixed": "3.3.23-15.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: etcd

Операционная система: rhel

Характеристика:
{
  "fixed": "3.3.23-15.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: foreman_ygg_worker

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.2-1.el7sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: foreman_ygg_worker

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.2-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: foreman_ygg_worker

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.2-1.el9sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: go-toolset-1.19

Операционная система: rhel

Характеристика:
{
  "fixed": "1.19.13-1.el7_9"
}

Источник: redhat

Тип: Конфигурация

Продукт: go-toolset-1.19-golang

Операционная система: rhel

Характеристика:
{
  "fixed": "1.19.13-2.el7_9"
}

Источник: redhat

Тип: Конфигурация

Продукт: golang

Операционная система: rhel

Характеристика:
{
  "fixed": "1.19.13-1.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.9-4.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.3.6-6.el8_4"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.3.6-6.el8_4"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.3.6-6.el8_4"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.5.11-6.el9_0"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.5.11-4.el8_6"
}

Источник: redhat

Тип: Конфигурация

Продукт: grafana

Операционная система: rhel

Характеристика:
{
  "fixed": "7.5.15-5.el8_8"
}

Источник: redhat

Тип: Конфигурация

Продукт: grpc

Операционная система: debian

Характеристика:
{
  "unfixed": true
}

Источник: debian

Тип: Конфигурация

Продукт: h2o

Операционная система: debian bullseye 11

Характеристика:
{
  "unfixed": true
}

Источник: debian

Тип: Конфигурация

Продукт: h2o

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: h2o

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: h2o

Операционная система: debian

Характеристика:
{
  "fixed": "2.2.5+dfsg2-8"
}

Источник: debian

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: debian

Характеристика:
{
  "fixed": "1.8.13-1"
}

Источник: debian

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu focal 20.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: haproxy

Операционная система: astra 1.6.8

Характеристика:
{
  "unaffected": true
}

Источник: astra

Тип: Конфигурация

Продукт: haproxy

Операционная система: astra 1.6.8

Характеристика:
{
  "unaffected": true
}

Источник: astra

Тип: Конфигурация

Продукт: helm

Операционная система: rhel

Характеристика:
{
  "fixed": "3.13.2-35.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: httpd24-nghttp2

Операционная система: rhel

Характеристика:
{
  "fixed": "1.7.1-11.el7"
}

Источник: redhat

Тип: Конфигурация

Продукт: jbcs-httpd24-nghttp2

Операционная система: rhel

Характеристика:
{
  "fixed": "1.43.0-12.el8jbcs"
}

Источник: redhat

Тип: Конфигурация

Продукт: jbcs-httpd24-nghttp2

Операционная система: rhel

Характеристика:
{
  "fixed": "1.43.0-12.el7jbcs"
}

Источник: redhat

Тип: Конфигурация

Продукт: jenkins

Операционная система: rhel

Характеристика:
{
  "fixed": "2.426.3.1706516352-3.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: jenkins

Операционная система: rhel

Характеристика:
{
  "fixed": "2.414.3.1698292201-3.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: jenkins

Операционная система: rhel

Характеристика:
{
  "fixed": "2.414.3.1699356615-3.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: jenkins-2-plugins

Операционная система: rhel

Характеристика:
{
  "fixed": "4.14.1699356715-1.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: jetty9

Операционная система: debian

Характеристика:
{
  "fixed": "9.4.53-1"
}

Источник: debian

Тип: Конфигурация

Продукт: jws5-tomcat

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.62-16.redhat_00014.1.el8jws"
}

Источник: redhat

Тип: Конфигурация

Продукт: jws5-tomcat

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.62-16.redhat_00014.1.el9jws"
}

Источник: redhat

Тип: Конфигурация

Продукт: jws5-tomcat

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.62-16.redhat_00014.1.el7jws"
}

Источник: redhat

Тип: Конфигурация

Продукт: kubevirt

Операционная система: rhel

Характеристика:
{
  "fixed": "4.13.6-1596.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: kubevirt

Операционная система: rhel

Характеристика:
{
  "fixed": "4.13.6-1596.el7"
}

Источник: redhat

Тип: Конфигурация

Продукт: kubevirt

Операционная система: rhel

Характеристика:
{
  "fixed": "4.13.6-1596.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: microshift

Операционная система: rhel

Характеристика:
{
  "fixed": "4.14.2-202311091609.p0.gd80d6de.assembly.4.14.2.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu focal 20.04

Характеристика:
{
  "fixed": "1:4.1.45-1ubuntu0.2"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "fixed": "1:4.1.48-4+deb11u2build0.22.04.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu kinetic 22.10

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: netty

Операционная система: debian

Характеристика:
{
  "fixed": "1:4.1.48-8"
}

Источник: debian

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.1

Характеристика:
{
  "fixed": "1.33.0-3.el8_1.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "fixed": "1.43.0-1ubuntu0.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.4

Характеристика:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.2

Характеристика:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu focal 20.04

Характеристика:
{
  "fixed": "1.40.0-1ubuntu0.2"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8

Характеристика:
{
  "fixed": "1.33.0-5.el8_8"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 9

Характеристика:
{
  "fixed": "1.43.0-5.el9_3.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: debian

Характеристика:
{
  "fixed": "1.57.0-1"
}

Источник: debian

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.4

Характеристика:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "fixed": "1.52.0-1ubuntu0.1"
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 9

Характеристика:
{
  "fixed": "1.43.0-5.el9_2.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.4

Характеристика:
{
  "fixed": "1.33.0-4.el8_4.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.6

Характеристика:
{
  "fixed": "1.33.0-4.el8_6.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 9.0

Характеристика:
{
  "fixed": "1.43.0-5.el9_0.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.2

Характеристика:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nghttp2

Операционная система: rhel 8.2

Характеристика:
{
  "fixed": "1.33.0-3.el8_2.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.22-9030020231017214601.9"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu focal 20.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.20.1-14.el9_2.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: debian

Характеристика:
{
  "fixed": "1.24.0-2"
}

Источник: debian

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.20.1-10.el9_0.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.22-9020020231011212752.9"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.20-8080020231012034601.63b34585"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.22-8080020231011224613.63b34585"
}

Источник: redhat

Тип: Конфигурация

Продукт: nginx

Операционная система: ubuntu jammy 22.04

Характеристика:
{
  "unaffected": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.20-8060020231011172032.ad008a3a"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "16.20.2-3.el9_0"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "16-8090020240315081818.a75119d5"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "20-8090020231019152822.a75119d5"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "16-8060020231013145914.ad008a3a"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "18-8080020231015215042.63b34585"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "16-8080020231013145100.63b34585"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "16.20.2-3.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "18-9020020231015221156.rhel9"
}

Источник: redhat

Тип: Конфигурация

Продукт: nodejs

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nodejs

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: nodejs

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: openshift

Операционная система: rhel

Характеристика:
{
  "fixed": "4.12.0-202310132326.p0.g20cda61.assembly.stream.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift

Операционная система: rhel

Характеристика:
{
  "fixed": "4.14.0-202310210404.p0.gf67aeb3.assembly.stream.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift

Операционная система: rhel

Характеристика:
{
  "fixed": "4.11.0-202310140343.p0.gec2a592.assembly.stream.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-clients

Операционная система: rhel

Характеристика:
{
  "fixed": "4.14.0-202310191146.p0.g0c63f9d.assembly.stream.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-gitops-kam

Операционная система: rhel

Характеристика:
{
  "fixed": "1.8.6-10.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-gitops-kam

Операционная система: rhel

Характеристика:
{
  "fixed": "1.9.3-32.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-pipelines-client

Операционная система: rhel

Характеристика:
{
  "fixed": "1.11.2-11148.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-pipelines-client

Операционная система: rhel

Характеристика:
{
  "fixed": "1.12.1-11260.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-pipelines-client

Операционная система: rhel

Характеристика:
{
  "fixed": "1.10.6-11031.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: openshift-serverless-clients

Операционная система: rhel

Характеристика:
{
  "fixed": "1.9.2-4.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: python-octavia-tests-tempest

Операционная система: rhel

Характеристика:
{
  "fixed": "1.3.0-1.20210528004838.0ae7f10.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: python-octavia-tests-tempest

Операционная система: rhel

Характеристика:
{
  "fixed": "1.9.0-1.20230509101018.el9ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: python-octavia-tests-tempest

Операционная система: rhel

Характеристика:
{
  "fixed": "1.4.1-2.20230111145026.f7718ef.el8ost"
}

Источник: redhat

Тип: Конфигурация

Продукт: receptor

Операционная система: rhel

Характеристика:
{
  "fixed": "1.4.2-1.el8ap"
}

Источник: redhat

Тип: Конфигурация

Продукт: receptor

Операционная система: rhel

Характеристика:
{
  "fixed": "1.4.2-1.el9ap"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-dotnet60-dotnet

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.123-1.el7_9"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-nginx120-nginx

Операционная система: rhel

Характеристика:
{
  "fixed": "1.20.1-1.el7.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-nodejs14-nodejs

Операционная система: rhel

Характеристика:
{
  "fixed": "14.21.3-5.el7"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-sso7-keycloak

Операционная система: rhel

Характеристика:
{
  "fixed": "18.0.11-2.redhat_00001.1.el9sso"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-sso7-keycloak

Операционная система: rhel

Характеристика:
{
  "fixed": "18.0.11-2.redhat_00001.1.el8sso"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-sso7-keycloak

Операционная система: rhel

Характеристика:
{
  "fixed": "18.0.11-2.redhat_00001.1.el7sso"
}

Источник: redhat

Тип: Конфигурация

Продукт: rh-varnish6-varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6.0.8-2.el7.3"
}

Источник: redhat

Тип: Конфигурация

Продукт: rhc-worker-script

Операционная система: rhel 7

Характеристика:
{
  "fixed": "0.5-1.el7_9"
}

Источник: redhat

Тип: Конфигурация

Продукт: skupper-cli

Операционная система: rhel

Характеристика:
{
  "fixed": "1.4.3-4.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: skupper-cli

Операционная система: rhel

Характеристика:
{
  "fixed": "1.4.3-4.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: skupper-router

Операционная система: rhel

Характеристика:
{
  "fixed": "2.4.3-1.el9"
}

Источник: redhat

Тип: Конфигурация

Продукт: skupper-router

Операционная система: rhel

Характеристика:
{
  "fixed": "2.4.3-1.el8"
}

Источник: redhat

Тип: Конфигурация

Продукт: tomcat

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.62-11.el9_2.3"
}

Источник: redhat

Тип: Конфигурация

Продукт: tomcat

Операционная система: rhel

Характеристика:
{
  "fixed": "9.0.62-5.el8_8.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: tomcat10

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat10

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat10

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat10

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat10

Операционная система: debian

Характеристика:
{
  "fixed": "10.1.14-1"
}

Источник: debian

Тип: Конфигурация

Продукт: tomcat8

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat8

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat9

Операционная система: debian

Характеристика:
{
  "fixed": "9.0.70-2"
}

Источник: debian

Тип: Конфигурация

Продукт: tomcat9

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat9

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat9

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: tomcat9

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: toolbox

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.99.3-10.el9_2"
}

Источник: redhat

Тип: Конфигурация

Продукт: toolbox

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.99.3-4.el9_0"
}

Источник: redhat

Тип: Конфигурация

Продукт: trafficserver

Операционная система: ubuntu xenial 16.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: trafficserver

Операционная система: debian

Характеристика:
{
  "fixed": "9.2.3+ds-1"
}

Источник: debian

Тип: Конфигурация

Продукт: trafficserver

Операционная система: ubuntu trusty 14.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: trafficserver

Операционная система: ubuntu lunar 23.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: trafficserver

Операционная система: ubuntu bionic 18.04

Характеристика:
{
  "unfixed": true
}

Источник: ubuntu

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8060020231019105116.ad008a3a"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8010020231019161354.c27ad7f8"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8020020231019140848.4cda2c84"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: debian bullseye 11

Характеристика:
{
  "unfixed": true
}

Источник: debian

Тип: Конфигурация

Продукт: varnish

Операционная система: debian

Характеристика:
{
  "fixed": "7.5.0-1"
}

Источник: debian

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6.6.2-2.el9_0.2"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6.6.2-3.el9_2.1"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: debian bookworm 12

Характеристика:
{
  "unfixed": true
}

Источник: debian

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8080020231018193953.63b34585"
}

Источник: redhat

Тип: Конфигурация

Продукт: varnish

Операционная система: rhel

Характеристика:
{
  "fixed": "6-8040020231019121844.522a0ee4"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.3-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.3-1.el7sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil

Операционная система: rhel

Характеристика:
{
  "fixed": "0.2.3-1.el9sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil-worker-forwarder

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.3-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil-worker-forwarder

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.3-1.el7sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil-worker-forwarder

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.3-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil-worker-forwarder

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.3-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Продукт: yggdrasil-worker-forwarder

Операционная система: rhel

Характеристика:
{
  "fixed": "0.0.3-1.el8sat"
}

Источник: redhat

Тип: Конфигурация

Поставщик: akka

Продукт: http_server

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:akka:http_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.5.3",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: amazon

Продукт: opensearch_data_prepper

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:amazon:opensearch_data_prepper:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.5.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: apache

Продукт: apisix

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.6.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.1.9",
      "versionStartIncluding": "8.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.3",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: apache

Продукт: solr

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.4.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: apache

Продукт: tomcat

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "8.5.93",
      "versionStartIncluding": "8.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "9.0.80",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "10.1.13",
      "versionStartIncluding": "10.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: apache

Продукт: traffic_server

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apache:apisix:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.6.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "8.1.9",
      "versionStartIncluding": "8.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.2.3",
      "versionStartIncluding": "9.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: apple

Продукт: swiftnio_http/2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:apple:swiftnio_http\\/2:*:*:*:*:*:swift:*:*",
      "versionEndExcluding": "1.28.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: caddyserver

Продукт: caddy

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:caddyserver:caddy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.7.5",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: connected_mobile_experiences

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: crosswork_data_gateway

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: crosswork_zero_touch_provisioning

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: data_center_network_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: enterprise_chat_and_email

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: expressway

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: firepower_threat_defense

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: fog_director

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: ios_xe

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: ios_xr

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: iot_field_network_director

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: nx-os

Операционная система: * * *

Характеристика:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.2\\(7\\)",
          "vulnerable": true
        },
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.3\\(5\\)",
          "versionStartIncluding": "10.3\\(1\\)",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-x\\/3132q-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172pq\\/pq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-x\\/xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-x\\/xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: nx-os

Операционная система: * * *

Характеристика:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.2\\(7\\)",
          "vulnerable": true
        },
        {
          "cpe23uri": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "10.3\\(5\\)",
          "versionStartIncluding": "10.3\\(1\\)",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9200yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92160yc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx3h:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93120tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93128tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180lc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-ex_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3h:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93240tc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332d-gx2b:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332d-h2r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9332pq_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348d-gx2a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348gc-fx3:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9364d-gx2a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px-e_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372px_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx-e_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9372tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396px_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9396tx_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9432pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_16-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_4-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_8-slot:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_a\\+:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500_supervisor_b\\+:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9504_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9508_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9516_switch:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9536pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9636pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9716d-gx:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9736pq:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9800:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9804:-:*:*:*:*:*:*:*"
        },
        {
          "cpe23uri": "cpe:2.3:h:cisco:nexus_9808:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: prime_access_registrar

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: prime_cable_provisioning

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: prime_infrastructure

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: prime_network_registrar

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: secure_dynamic_attributes_connector

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: secure_malware_analytics

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: secure_web_appliance_firmware

Операционная система: * * *

Характеристика:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:cisco:secure_web_appliance_firmware:*:*:*:*:*:*:*:*",
          "versionEndExcluding": "15.1.0",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:h:cisco:secure_web_appliance:-:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: telepresence_video_communication_server

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: ultra_cloud_core_-_policy_control_function

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: ultra_cloud_core_-_serving_gateway_function

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: ultra_cloud_core_-_session_management_function

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: unified_attendant_console_advanced

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: unified_contact_center_domain_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: unified_contact_center_enterprise

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: unified_contact_center_enterprise_-_live_data_server

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: cisco

Продукт: unified_contact_center_management_portal

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:cisco:connected_mobile_experiences:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_data_gateway:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:crosswork_zero_touch_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:data_center_network_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:enterprise_chat_and_email:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:expressway:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.4.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:iot_field_network_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.11.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_access_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_cable_provisioning:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.2.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "3.10.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:prime_network_registrar:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_dynamic_attributes_connector:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.2.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:secure_malware_analytics:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.19.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:telepresence_video_communication_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "x14.3.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.01.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_policy_control_function:2024.01.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_serving_gateway_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:ultra_cloud_core_-_session_management_function:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2024.02.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_attendant_console_advanced:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_domain_manager:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_enterprise_-_live_data_server:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.6.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:cisco:unified_contact_center_management_portal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:fog_director:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.22",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.15.1",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.11.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: debian

Продукт: debian_linux

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: dena

Продукт: h2o

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-10",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: eclipse

Продукт: jetty

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "9.4.53",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17",
      "versionStartIncluding": "10.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "11.0.17",
      "versionStartIncluding": "11.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "12.0.2",
      "versionStartIncluding": "12.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: envoyproxy

Продукт: envoy

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.24.10:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.25.9:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.26.4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:envoyproxy:envoy:1.27.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_access_policy_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_advanced_firewall_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_advanced_web_application_firewall

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_analytics

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_application_acceleration_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_application_security_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_application_visibility_and_reporting

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_carrier-grade_nat

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_ddos_hybrid_defender

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_domain_name_system

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_fraud_protection_service

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_global_traffic_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_link_controller

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_local_traffic_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_next

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_next_service_proxy_for_kubernetes

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_policy_enforcement_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_ssl_orchestrator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_webaccelerator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: big-ip_websafe

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: nginx

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: nginx_ingress_controller

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: f5

Продукт: nginx_plus

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_access_policy_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_analytics:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_security_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_domain_name_system:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_fraud_protection_service:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_global_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_link_controller:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_local_traffic_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next:20.0.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_next_service_proxy_for_kubernetes:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.8.2",
      "versionStartIncluding": "1.5.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_webaccelerator:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "13.1.5",
      "versionStartIncluding": "13.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "14.1.5",
      "versionStartIncluding": "14.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "15.1.10",
      "versionStartIncluding": "15.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "16.1.4",
      "versionStartIncluding": "16.1.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:big-ip_websafe:17.1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "1.25.2",
      "versionStartIncluding": "1.9.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "2.4.2",
      "versionStartIncluding": "2.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_ingress_controller:*:*:*:*:*:*:*:*",
      "versionEndIncluding": "3.3.0",
      "versionStartIncluding": "3.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "r29",
      "versionStartIncluding": "r25",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r29:-:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:f5:nginx_plus:r30:-:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: facebook

Продукт: proxygen

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:facebook:proxygen:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023.10.16.00",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: fedoraproject

Продукт: fedora

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: golang

Продукт: go

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: golang

Продукт: http2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: golang

Продукт: networking

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.20.10",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.3",
      "versionStartIncluding": "1.21.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:golang:networking:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "0.17.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: grpc

Продукт: grpc

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "1.56.3",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:-:*:*",
      "versionEndIncluding": "1.59.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:go:*:*",
      "versionEndExcluding": "1.58.3",
      "versionStartIncluding": "1.58.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:grpc:grpc:1.57.0:-:*:*:*:go:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: ietf

Продукт: http

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:ietf:http:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: istio

Продукт: istio

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.18.3",
      "versionStartIncluding": "1.18.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:istio:istio:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.19.1",
      "versionStartIncluding": "1.19.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: jenkins

Продукт: jenkins

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
      "versionEndIncluding": "2.414.2",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
      "versionEndIncluding": "2.427",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: kazu-yamamoto

Продукт: http2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:kazu-yamamoto:http2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.2.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: konghq

Продукт: kong_gateway

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:konghq:kong_gateway:*:*:*:*:enterprise:*:*:*",
      "versionEndExcluding": "3.4.2",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: linecorp

Продукт: armeria

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:linecorp:armeria:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.26.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: linkerd

Продукт: linkerd

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:*:*:*:*:stable:kubernetes:*:*",
      "versionEndIncluding": "2.12.5",
      "versionStartIncluding": "2.12.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.13.0:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.13.1:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.14.0:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:linkerd:linkerd:2.14.1:*:*:*:stable:kubernetes:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: .net

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: asp.net_core

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: azure_kubernetes_service

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: cbl-mariner

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:cbl-mariner:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-11",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: visual_studio_2022

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_10_1607

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_10_1809

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_10_21h2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_10_22h2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_11_21h2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_11_22h2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_server_2016

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_server_2019

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: microsoft

Продукт: windows_server_2022

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "6.0.23",
      "versionStartIncluding": "6.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:asp.net_core:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "7.0.12",
      "versionStartIncluding": "7.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:azure_kubernetes_service:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-08",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.2.20",
      "versionStartIncluding": "17.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.4.12",
      "versionStartIncluding": "17.4",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.6.8",
      "versionStartIncluding": "17.6",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "17.7.5",
      "versionStartIncluding": "17.7",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
      "versionEndExcluding": "10.0.14393.6351",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.17763.4974",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19044.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.19045.3570",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22000.2538",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "10.0.22621.2428",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: netapp

Продукт: astra_control_center

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: netapp

Продукт: oncommand_insight

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: netty

Продукт: netty

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:netty:netty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "4.1.100",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: nghttp2

Продукт: nghttp2

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:nghttp2:nghttp2:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.57.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: nodejs

Продукт: node.js

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*",
      "versionEndExcluding": "18.18.2",
      "versionStartIncluding": "18.0.0",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "20.8.1",
      "versionStartIncluding": "20.0.0",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: openresty

Продукт: openresty

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:openresty:openresty:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.21.4.3",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: projectcontour

Продукт: contour

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:projectcontour:contour:*:*:*:*:*:kubernetes:*:*",
      "versionEndExcluding": "2023-10-11",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: 3scale_api_management_platform

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: advanced_cluster_management_for_kubernetes

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: advanced_cluster_security

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: ansible_automation_platform

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: build_of_optaplanner

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: build_of_quarkus

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: ceph_storage

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: cert-manager_operator_for_red_hat_openshift

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: certification_for_red_hat_enterprise_linux

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: cost_management

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: cryostat

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: decision_manager

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: enterprise_linux

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: fence_agents_remediation_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: integration_camel_for_spring_boot

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: integration_camel_k

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: integration_service_registry

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_a-mq

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_a-mq_streams

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_core_services

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_data_grid

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_enterprise_application_platform

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: jboss_fuse

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: logging_subsystem_for_red_hat_openshift

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: machine_deletion_remediation_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: migration_toolkit_for_applications

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: migration_toolkit_for_containers

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: migration_toolkit_for_virtualization

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: network_observability_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: node_healthcheck_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: node_maintenance_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_api_for_data_protection

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_container_platform

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_container_platform_assisted_installer

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_data_science

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_dev_spaces

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_developer_tools_and_services

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_distributed_tracing

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_gitops

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_pipelines

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_sandboxed_containers

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_secondary_scheduler_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_serverless

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_service_mesh

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openshift_virtualization

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: openstack_platform

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: process_automation

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: quay

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: run_once_duration_override_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: satellite

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: self_node_remediation_operator

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: service_interconnect

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: service_telemetry_framework

Операционная система: * * *

Характеристика:
{
  "children": [
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:a:redhat:service_telemetry_framework:1.5:*:*:*:*:*:*:*",
          "vulnerable": true
        }
      ],
      "operator": "OR"
    },
    {
      "cpe_match": [
        {
          "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
        }
      ],
      "operator": "OR"
    }
  ],
  "operator": "AND"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: single_sign-on

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: support_for_spring_boot

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: redhat

Продукт: web_terminal

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:redhat:3scale_api_management_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_management_for_kubernetes:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:3.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:advanced_cluster_security:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_optaplanner:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cert-manager_operator_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:certification_for_red_hat_enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cost_management:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:cryostat:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:fence_agents_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:integration_service_registry:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq:7:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_a-mq_streams:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:logging_subsystem_for_red_hat_openshift:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:machine_deletion_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_applications:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:migration_toolkit_for_virtualization:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:network_observability_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_healthcheck_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:node_maintenance_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift:-:*:*:*:*:aws:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_api_for_data_protection:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_container_platform_assisted_installer:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_data_science:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_dev_spaces:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_distributed_tracing:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_gitops:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_pipelines:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_sandboxed_containers:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_secondary_scheduler_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_serverless:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openshift_virtualization:4:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:16.2:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:openstack_platform:17.1:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:quay:3.0.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:run_once_duration_override_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:self_node_remediation_operator:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:service_interconnect:1.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:support_for_spring_boot:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:redhat:web_terminal:-:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: traefik

Продукт: traefik

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2.10.5",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta1:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta2:*:*:*:*:*:*",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:traefik:traefik:3.0.0:beta3:*:*:*:*:*:*",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Конфигурация

Поставщик: varnish_cache_project

Продукт: varnish_cache

Операционная система: * * *

Характеристика:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:varnish_cache_project:varnish_cache:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "2023-10-10",
      "vulnerable": true
    }
  ],
  "operator": "OR"
}

Источник: nvd

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7515

Операционная система: Windows 14393 build 7515

Идентификатор: KB5046612

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3692

Операционная система: Windows 20348 build 3692

Идентификатор: KB5058385

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5053643

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5050081

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7785

Операционная система: Windows 14393 build 7785

Идентификатор: KB5052006

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058921

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7159

Операционная система: Windows 14393 build 7159

Идентификатор: KB5040434

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6981

Операционная система: Windows 14393 build 6981

Идентификатор: KB5037763

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.8148

Операционная система: Windows 14393 build 8148

Идентификатор: KB5061010

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7876

Операционная система: Windows 14393 build 7876

Идентификатор: KB5053594

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6897

Операционная система: Windows 14393 build 6897

Идентификатор: KB5036899

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7699

Операционная система: Windows 14393 build 7699

Идентификатор: KB5049993

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7969

Операционная система: Windows 14393 build 7969

Идентификатор: KB5055521

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6709

Операционная система: Windows 14393 build 6709

Идентификатор: KB5034767

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7606

Операционная система: Windows 14393 build 7606

Идентификатор: KB5048671

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6529

Операционная система: Windows 14393 build 6529

Идентификатор: KB5033373

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7070

Операционная система: Windows 14393 build 7070

Идентификатор: KB5039214

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7259

Операционная система: Windows 14393 build 7259

Идентификатор: KB5041773

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6614

Операционная система: Windows 14393 build 6614

Идентификатор: KB5034119

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6796

Операционная система: Windows 14393 build 6796

Идентификатор: KB5035855

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7336

Операционная система: Windows 14393 build 7336

Идентификатор: KB5043051

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6452

Операционная система: Windows 14393 build 6452

Идентификатор: KB5032197

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.8066

Операционная система: Windows 14393 build 8066

Идентификатор: KB5058383

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19041.3570

Операционная система: Windows 19041 build 3570

Идентификатор: KB5031356

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5487

Операционная система: Windows 19044 build 5487

Идентификатор: KB5051974

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5039299

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5046714

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5371

Операционная система: Windows 19044 build 5371

Идентификатор: KB5049981

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5035941

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5055612

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5036979

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19041.3803

Операционная система: Windows 19041 build 3803

Идентификатор: KB5033372

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5061768

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5011

Операционная система: Windows 19044 build 5011

Идентификатор: KB5044273

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5034843

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5040525

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5041582

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5045594

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5052077

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.3693

Операционная система: Windows 19044 build 3693

Идентификатор: KB5032189

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4291

Операционная система: Windows 19044 build 4291

Идентификатор: KB5036892

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5034203

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4529

Операционная система: Windows 19044 build 4529

Идентификатор: KB5039211

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4046

Операционная система: Windows 19044 build 4046

Идентификатор: KB5034763

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5965

Операционная система: Windows 19044 build 5965

Идентификатор: KB5060533

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 6.0.25

Операционная система: Windows 0 build 25

Идентификатор: KB5032883

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5037423

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.7428

Операционная система: Windows 14393 build 7428

Идентификатор: KB5044293

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.3930

Операционная система: Windows 19044 build 3930

Идентификатор: KB5034122

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5131

Операционная система: Windows 19044 build 5131

Идентификатор: KB5046613

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4412

Операционная система: Windows 19044 build 4412

Идентификатор: KB5037768

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5061979

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5608

Операционная система: Windows 19044 build 5608

Идентификатор: KB5053606

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4894

Операционная система: Windows 19044 build 4894

Идентификатор: KB5043064

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4651

Операционная система: Windows 19044 build 4651

Идентификатор: KB5040427

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5031445

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5037849

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5043131

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4780

Операционная система: Windows 19044 build 4780

Идентификатор: KB5041580

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.4170

Операционная система: Windows 19044 build 4170

Идентификатор: KB5035845

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.14393.6351

Операционная система: Windows 14393 build 6351

Идентификатор: KB5031362

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5032278

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5854

Операционная система: Windows 19044 build 5854

Идентификатор: KB5058379

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5737

Операционная система: Windows 19044 build 5737

Идентификатор: KB5055518

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.2428

Операционная система: Windows 22621 build 2428

Идентификатор: KB5031354

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5035942

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4602

Операционная система: Windows 22621 build 4602

Идентификатор: KB5048685

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4037

Операционная система: Windows 22621 build 4037

Идентификатор: KB5041585

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3447

Операционная система: Windows 22621 build 3447

Идентификатор: KB5036893

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5053657

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.5039

Операционная система: Windows 22621 build 5039

Идентификатор: KB5053602

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5037853

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5036980

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5032288

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22631.4169

Операционная система: Windows 22631 build 4169

Идентификатор: KB5043076

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4890

Операционная система: Windows 22621 build 4890

Идентификатор: KB5051989

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058502

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.5189

Операционная система: Windows 22621 build 5189

Идентификатор: KB5055528

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5052094

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5046732

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3155

Операционная система: Windows 22621 build 3155

Идентификатор: KB5034765

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3007

Операционная система: Windows 22621 build 3007

Идентификатор: KB5034123

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5031455

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5044380

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5034848

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5055629

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3296

Операционная система: Windows 22621 build 3296

Идентификатор: KB5035853

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3880

Операционная система: Windows 22621 build 3880

Идентификатор: KB5040442

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.5472

Операционная система: Windows 22621 build 5472

Идентификатор: KB5060999

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058481

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3593

Операционная система: Windows 22621 build 3593

Идентификатор: KB5037771

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5062170

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5050092

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4460

Операционная система: Windows 22621 build 4460

Идентификатор: KB5046633

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5040527

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4751

Операционная система: Windows 22621 build 4751

Идентификатор: KB5050021

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058919

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5041587

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5043145

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5039302

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.2715

Операционная система: Windows 22621 build 2715

Идентификатор: KB5032190

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5034204

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.4317

Операционная система: Windows 22621 build 4317

Идентификатор: KB5044285

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.3737

Операционная система: Windows 22621 build 3737

Идентификатор: KB5039212

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.2861

Операционная система: Windows 22621 build 2861

Идентификатор: KB5033375

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2538

Операционная система: Windows 22000 build 2538

Идентификатор: KB5031358

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2836

Операционная система: Windows 22000 build 2836

Идентификатор: KB5035854

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2600

Операционная система: Windows 22000 build 2600

Идентификатор: KB5032192

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2713

Операционная система: Windows 22000 build 2713

Идентификатор: KB5034121

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2652

Операционная система: Windows 22000 build 2652

Идентификатор: KB5033369

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.3147

Операционная система: Windows 22000 build 3147

Идентификатор: KB5041592

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2960

Операционная система: Windows 22000 build 2960

Идентификатор: KB5037770

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.3260

Операционная система: Windows 22000 build 3260

Идентификатор: KB5044280

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2899

Операционная система: Windows 22000 build 2899

Идентификатор: KB5036894

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.2777

Операционная система: Windows 22000 build 2777

Идентификатор: KB5034766

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.3197

Операционная система: Windows 22000 build 3197

Идентификатор: KB5043067

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.3019

Операционная система: Windows 22000 build 3019

Идентификатор: KB5039213

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22000.3079

Операционная система: Windows 22000 build 3079

Идентификатор: KB5040431

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2031

Операционная система: Windows 20348 build 2031

Идентификатор: KB5031364

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2402

Операционная система: Windows 20348 build 2402

Идентификатор: KB5036909

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2113

Операционная система: Windows 20348 build 2113

Идентификатор: KB5032198

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2700

Операционная система: Windows 20348 build 2700

Идентификатор: KB5042881

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3207

Операционная система: Windows 20348 build 3207

Идентификатор: KB5051979

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3091

Операционная система: Windows 20348 build 3091

Идентификатор: KB5049983

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5047767

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5052819

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5037422

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2159

Операционная система: Windows 20348 build 2159

Идентификатор: KB5033118

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5061906

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2655

Операционная система: Windows 20348 build 2655

Идентификатор: KB5041160

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2322

Операционная система: Windows 20348 build 2322

Идентификатор: KB5034770

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5059092

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 6.0.24

Операционная система: Windows 0 build 24

Идентификатор: KB5032874

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 6.0.26

Операционная система: Windows 0 build 26

Идентификатор: KB5033733

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.22621.5335

Операционная система: Windows 22621 build 5335

Идентификатор: KB5058405

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2340

Операционная система: Windows 20348 build 2340

Идентификатор: KB5035857

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2461

Операционная система: Windows 20348 build 2461

Идентификатор: KB5037782

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2966

Операционная система: Windows 20348 build 2966

Идентификатор: KB5048654

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3807

Операционная система: Windows 20348 build 3807

Идентификатор: KB5060526

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058920

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5041054

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2849

Операционная система: Windows 20348 build 2849

Идентификатор: KB5046616

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2582

Операционная система: Windows 20348 build 2582

Идентификатор: KB5040437

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3328

Операционная система: Windows 20348 build 3328

Идентификатор: KB5053603

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.3453

Операционная система: Windows 20348 build 3453

Идентификатор: KB5055526

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2762

Операционная система: Windows 20348 build 2762

Идентификатор: KB5044281

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.4974

Операционная система: Windows 17763 build 4974

Идентификатор: KB5031361

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6189

Операционная система: Windows 17763 build 6189

Идентификатор: KB5041578

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6775

Операционная система: Windows 17763 build 6775

Идентификатор: KB5050008

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5059091

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6532

Операционная система: Windows 17763 build 6532

Идентификатор: KB5046615

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5039705

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5820

Операционная система: Windows 17763 build 5820

Идентификатор: KB5037765

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5458

Операционная система: Windows 17763 build 5458

Идентификатор: KB5034768

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.7314

Операционная система: Windows 17763 build 7314

Идентификатор: KB5058392

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6293

Операционная система: Windows 17763 build 6293

Идентификатор: KB5043050

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5058922

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.7009

Операционная система: Windows 17763 build 7009

Идентификатор: KB5053596

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5206

Операционная система: Windows 17763 build 5206

Идентификатор: KB5033371

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5329

Операционная система: Windows 17763 build 5329

Идентификатор: KB5034127

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5696

Операционная система: Windows 17763 build 5696

Идентификатор: KB5036896

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5061978

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.7136

Операционная система: Windows 17763 build 7136

Идентификатор: KB5055519

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6414

Операционная система: Windows 17763 build 6414

Идентификатор: KB5044277

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6893

Операционная система: Windows 17763 build 6893

Идентификатор: KB5052000

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.7434

Операционная система: Windows 17763 build 7434

Идентификатор: KB5060531

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5936

Операционная система: Windows 17763 build 5936

Идентификатор: KB5039217

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Операционная система: Windows

Идентификатор: KB5037425

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5122

Операционная система: Windows 17763 build 5122

Идентификатор: KB5032196

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.5576

Операционная система: Windows 17763 build 5576

Идентификатор: KB5035849

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6054

Операционная система: Windows 17763 build 6054

Идентификатор: KB5040430

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.17763.6659

Операционная система: Windows 17763 build 6659

Идентификатор: KB5048661

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 7.0.13

Операционная система: Windows 0 build 13

Идентификатор: KB5032875

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 7.0.15

Операционная система: Windows 0 build 15

Идентификатор: KB5033734

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 7.0.14

Операционная система: Windows 0 build 14

Идентификатор: KB5032884

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2227

Операционная система: Windows 20348 build 2227

Идентификатор: KB5034129

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.20348.2527

Операционная система: Windows 20348 build 2527

Идентификатор: KB5039227

Источник: msrc

Тип: Windows KB

Поставщик: Microsoft

Продукт: Windows

Версия: 10.0.19044.5247

Операционная система: Windows 19044 build 5247

Идентификатор: KB5048652

Источник: msrc