text
stringlengths
9
39.2M
dir
stringlengths
26
295
lang
stringclasses
185 values
created_date
timestamp[us]
updated_date
timestamp[us]
repo_name
stringlengths
1
97
repo_full_name
stringlengths
7
106
star
int64
1k
183k
len_tokens
int64
1
13.8M
```xml <shapes name="mxgraph.mockup.controls"> <shape name="Horizontal Slidebar" h="23" w="219" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#818181"/> <path> <move x="31" y="0"/> <line x="31" y="23"/> </path> <stroke/> <path> <move x="57" y="0"/> <line x="57" y="23"/> </path> <stroke/> <path> <move x="84" y="0"/> <line x="84" y="23"/> </path> <stroke/> <path> <move x="109" y="0.401"/> <line x="109" y="23"/> </path> <stroke/> <path> <move x="135" y="0"/> <line x="135" y="23"/> </path> <stroke/> <path> <move x="161" y="0"/> <line x="161" y="23"/> </path> <stroke/> <path> <move x="188" y="0"/> <line x="188" y="23"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="109" y="5"/> <line x="114" y="9"/> <line x="114" y="23"/> <line x="104" y="23"/> <line x="104" y="9"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="On-Off Button 4" h="31" w="130" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#333333"/> <fillcolor color="#4342a9"/> <roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/> <fillstroke/> <fillcolor color="#c7c7c7"/> <roundrect x="65" y="0" w="65" h="31" arcsize="7.147"/> <fillstroke/> <fontsize size="16"/> <fontstyle style="1"/> <fontcolor color="#ffffff"/> <text str="ON" x="32.5" y="15.5" align="center" valign="middle"/> </foreground> </shape> <shape name="Knob 1" h="110" w="105" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#000000"/> <path> <move x="52.5" y="52.83"/> <line x="19.33" y="74.17"/> </path> <stroke/> <path> <move x="53.5" y="52.67"/> <line x="17.67" y="34.5"/> </path> <stroke/> <path> <move x="52.33" y="52.83"/> <line x="87.17" y="73"/> </path> <stroke/> <path> <move x="53.17" y="53"/> <line x="87.5" y="34.17"/> </path> <stroke/> <path> <move x="52.5" y="52.5"/> <line x="52.5" y="14.5"/> </path> <stroke/> <fillcolor color="#bbbbbb"/> <ellipse x="18.5" y="19" w="68" h="68"/> <fillstroke/> <strokecolor color="#ffffff"/> <fillcolor color="#404040"/> <path> <move x="24.46" y="41.09"/> <line x="51.55" y="54.55"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="54.23" y="53.65"/> <line x="54.31" y="53.49"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="53.41" y="50.81"/> <line x="26.32" y="37.35"/> <arc rx="2" ry="2" x-axis-rotation="-63.571" large-arc-flag="0" sweep-flag="0" x="23.64" y="38.25"/> <line x="23.56" y="38.41"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="24.46" y="41.09"/> <close/> </path> <fillstroke/> <strokewidth width="1.5"/> <fillcolor color="none"/> <ellipse x="17.5" y="18" w="70.5" h="70"/> <stroke/> <fontsize size="12"/> <fontstyle style="1"/> <text str="Knob Label" x="52.5" y="100" align="center" valign="middle"/> <fontsize size="8"/> <text str="0" x="15" y="75" align="center" valign="middle"/> <text str="50" x="12" y="33" align="center" valign="middle"/> <text str="50" x="52.5" y="10" align="center" valign="middle"/> <text str="75" x="93" y="33" align="center" valign="middle"/> <text str="100" x="95" y="75" align="center" valign="middle"/> </foreground> </shape> <shape name="Knob 2" h="110" w="104.69" aspect="1"> <foreground> <strokecolor color="#000000"/> <fillcolor color="#bbbbbb"/> <ellipse x="19.09" y="20.42" w="68" h="68"/> <fillstroke/> <strokecolor color="#ffffff"/> <fillcolor color="#404040"/> <path> <move x="25.05" y="42.51"/> <line x="52.13" y="55.97"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="54.82" y="55.07"/> <line x="54.9" y="54.91"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="53.99" y="52.23"/> <line x="26.91" y="38.76"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="24.23" y="39.67"/> <line x="24.15" y="39.83"/> <arc rx="2" ry="2" x-axis-rotation="-63.57" large-arc-flag="0" sweep-flag="0" x="25.05" y="42.51"/> <close/> </path> <fillstroke/> <strokecolor color="none"/> <fillcolor color="#b50c0b"/> <path> <move x="86.09" y="87.92"/> <line x="79.09" y="80.42"/> <arc rx="37.7" ry="37.7" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="30.09" y="23.42"/> <arc rx="47" ry="47" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="80.09" y="13.42"/> <arc rx="48" ry="48" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="86.09" y="87.92"/> <close/> </path> <fillstroke/> <fillcolor color="#13008f"/> <path> <move x="26.09" y="79.42"/> <line x="18.09" y="87.42"/> <arc rx="48.5" ry="48.5" x-axis-rotation="0" large-arc-flag="0" sweep-flag="1" x="76.09" y="11.22"/> <arc rx="46.6" ry="46.6" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="29.42" y="22.42"/> <arc rx="40" ry="40" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="25.75" y="79.08"/> <close/> </path> <fillstroke/> <strokecolor color="#ffffff"/> <strokewidth width="2"/> <fillcolor color="none"/> <path> <move x="26.59" y="79.42"/> <line x="18.09" y="87.92"/> <arc rx="48.5" ry="48.5" x-axis-rotation="0" large-arc-flag="1" sweep-flag="1" x="86.09" y="88.42"/> <line x="78.59" y="80.42"/> <arc rx="37" ry="37" x-axis-rotation="0" large-arc-flag="1" sweep-flag="0" x="26.59" y="79.42"/> <close/> </path> <stroke/> <linecap cap="round"/> <path> <move x="76.09" y="11.42"/> <arc rx="48" ry="48" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="27.09" y="25.42"/> <arc rx="39" ry="39" x-axis-rotation="0" large-arc-flag="0" sweep-flag="0" x="26.69" y="79.42"/> </path> <stroke/> <fontsize size="12"/> <fontstyle style="1"/> <text str="Knob Label" x="52.5" y="100" align="center" valign="middle"/> </foreground> </shape> <shape name="Horizontal Interval Bar 1" h="23" w="219" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#818181"/> <path> <move x="31" y="0"/> <line x="31" y="23"/> </path> <stroke/> <path> <move x="57" y="0"/> <line x="57" y="23"/> </path> <stroke/> <path> <move x="84" y="0"/> <line x="84" y="23"/> </path> <stroke/> <path> <move x="109" y="0.401"/> <line x="109" y="23"/> </path> <stroke/> <path> <move x="135" y="0"/> <line x="135" y="23"/> </path> <stroke/> <path> <move x="161" y="0"/> <line x="161" y="23"/> </path> <stroke/> <path> <move x="188" y="0"/> <line x="188" y="23"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/> <fillstroke/> <fillcolor color="#4a3ca7"/> <rect x="60" y="9" w="100" h="9"/> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="57" y="5"/> <line x="62" y="9"/> <line x="62" y="23"/> <line x="52" y="23"/> <line x="52" y="9"/> <close/> </path> <fillstroke/> <path> <move x="161.2" y="5"/> <line x="166.2" y="9"/> <line x="166.2" y="23"/> <line x="156.2" y="23"/> <line x="156.2" y="9"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="Horizontal Interval Bar 2" h="23" w="219" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#818181"/> <path> <move x="31" y="0"/> <line x="31" y="23"/> </path> <stroke/> <path> <move x="57" y="0"/> <line x="57" y="23"/> </path> <stroke/> <path> <move x="84" y="0"/> <line x="84" y="23"/> </path> <stroke/> <path> <move x="109" y="0.401"/> <line x="109" y="23"/> </path> <stroke/> <path> <move x="135" y="0"/> <line x="135" y="23"/> </path> <stroke/> <path> <move x="161" y="0"/> <line x="161" y="23"/> </path> <stroke/> <path> <move x="188" y="0"/> <line x="188" y="23"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <roundrect x="0" y="9" w="219" h="9" arcsize="26.142"/> <fillstroke/> <fillcolor color="#4a3ca7"/> <rect x="60" y="9" w="49.2" h="9"/> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="57" y="5"/> <line x="62" y="9"/> <line x="62" y="23"/> <line x="52" y="23"/> <line x="52" y="9"/> <close/> </path> <fillstroke/> <strokecolor color="#818181"/> <fillcolor color="#6ba745"/> <rect x="109" y="9" w="50" h="9"/> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="161.2" y="5"/> <line x="166.2" y="9"/> <line x="166.2" y="23"/> <line x="156.2" y="23"/> <line x="156.2" y="9"/> <close/> </path> <fillstroke/> <path> <move x="109" y="5"/> <line x="114" y="9"/> <line x="114" y="23"/> <line x="104" y="23"/> <line x="104" y="9"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="Vertical Interval Bar 2" h="219" w="23" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#818181"/> <path> <move x="23" y="31"/> <line x="0" y="31"/> </path> <stroke/> <path> <move x="23" y="57"/> <line x="0" y="57"/> </path> <stroke/> <path> <move x="23" y="84"/> <line x="0" y="84"/> </path> <stroke/> <path> <move x="22.6" y="109"/> <line x="0" y="109"/> </path> <stroke/> <path> <move x="23" y="135"/> <line x="0" y="135"/> </path> <stroke/> <path> <move x="23" y="161"/> <line x="0" y="161"/> </path> <stroke/> <path> <move x="23" y="188"/> <line x="0" y="188"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <path> <move x="9" y="0"/> <line x="10" y="0"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/> <line x="5" y="214"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/> <line x="9" y="219"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/> <line x="14" y="5"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/> <close/> </path> <fillstroke/> <fillcolor color="#4a3ca7"/> <path> <move x="14" y="60"/> <line x="5" y="60"/> <line x="5" y="109.2"/> <line x="14" y="109.2"/> <close/> </path> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="18" y="57"/> <line x="14" y="62"/> <line x="0" y="62"/> <line x="0" y="52"/> <line x="14" y="52"/> <close/> </path> <fillstroke/> <strokecolor color="#818181"/> <fillcolor color="#6ba745"/> <path> <move x="14" y="109"/> <line x="5" y="109"/> <line x="5" y="159"/> <line x="14" y="159"/> <close/> </path> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="18" y="161.2"/> <line x="14" y="166.2"/> <line x="0" y="166.2"/> <line x="0" y="156.2"/> <line x="14" y="156.2"/> <close/> </path> <fillstroke/> <path> <move x="18" y="109"/> <line x="14" y="114"/> <line x="0" y="114"/> <line x="0" y="104"/> <line x="14" y="104"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="Vertical Interval Bar 1" h="219" w="23" aspect="1"> <foreground> <strokecolor color="#818181"/> <path> <move x="23" y="31"/> <line x="0" y="31"/> </path> <stroke/> <path> <move x="23" y="57"/> <line x="0" y="57"/> </path> <stroke/> <path> <move x="23" y="84"/> <line x="0" y="84"/> </path> <stroke/> <path> <move x="22.6" y="109"/> <line x="0" y="109"/> </path> <stroke/> <path> <move x="23" y="135"/> <line x="0" y="135"/> </path> <stroke/> <path> <move x="23" y="161"/> <line x="0" y="161"/> </path> <stroke/> <path> <move x="23" y="188"/> <line x="0" y="188"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <path> <move x="9" y="0"/> <line x="10" y="0"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/> <line x="5" y="214"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/> <line x="9" y="219"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/> <line x="14" y="5"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/> <close/> </path> <fillstroke/> <fillcolor color="#4a3ca7"/> <path> <move x="14" y="60"/> <line x="5" y="60"/> <line x="5" y="160"/> <line x="14" y="160"/> <close/> </path> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="18" y="57"/> <line x="14" y="62"/> <line x="0" y="62"/> <line x="0" y="52"/> <line x="14" y="52"/> <close/> </path> <fillstroke/> <path> <move x="18" y="161.2"/> <line x="14" y="166.2"/> <line x="0" y="166.2"/> <line x="0" y="156.2"/> <line x="14" y="156.2"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="Vertical Slidebar" h="219" w="23" aspect="1"> <foreground> <strokecolor color="#818181"/> <path> <move x="23" y="31"/> <line x="0" y="31"/> </path> <stroke/> <path> <move x="23" y="57"/> <line x="0" y="57"/> </path> <stroke/> <path> <move x="23" y="84"/> <line x="0" y="84"/> </path> <stroke/> <path> <move x="22.6" y="109"/> <line x="0" y="109"/> </path> <stroke/> <path> <move x="23" y="135"/> <line x="0" y="135"/> </path> <stroke/> <path> <move x="23" y="161"/> <line x="0" y="161"/> </path> <stroke/> <path> <move x="23" y="188"/> <line x="0" y="188"/> </path> <stroke/> <fillcolor color="#f2f2f2"/> <path> <move x="9" y="0"/> <line x="10" y="0"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="5" y="5"/> <line x="5" y="214"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="10" y="219"/> <line x="9" y="219"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="14" y="214"/> <line x="14" y="5"/> <arc rx="5" ry="5" x-axis-rotation="90" large-arc-flag="0" sweep-flag="0" x="9" y="0"/> <close/> </path> <fillstroke/> <strokecolor color="#333333"/> <fillcolor color="#7f7f7f"/> <path> <move x="18" y="109"/> <line x="14" y="114"/> <line x="0" y="114"/> <line x="0" y="104"/> <line x="14" y="104"/> <close/> </path> <fillstroke/> </foreground> </shape> <shape name="On-Off Button 1" h="31" w="130" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#333333"/> <fillcolor color="#ffffff"/> <roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/> <fillstroke/> <fillcolor color="#c7c7c7"/> <roundrect x="0" y="0" w="65" h="31" arcsize="7.147"/> <fillstroke/> <fontsize size="16"/> <fontstyle style="1"/> <text str="OFF" x="97.5" y="15.5" align="center" valign="middle"/> </foreground> </shape> <shape name="On-Off Button 2" h="31" w="130" aspect="1"> <foreground> <strokecolor color="#333333"/> <fillcolor color="#772222"/> <roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/> <fillstroke/> <fillcolor color="#c7c7c7"/> <roundrect x="0" y="0" w="65" h="31" arcsize="7.147"/> <fillstroke/> <fontsize size="16"/> <fontstyle style="1"/> <fontcolor color="#ffffff"/> <text str="OFF" x="97.5" y="15.5" align="center" valign="middle"/> </foreground> </shape> <shape name="On-Off Button 3" h="31" w="130" aspect="1"> <foreground> <strokecolor color="#000000"/> <strokecolor color="#333333"/> <fillcolor color="#ffffff"/> <roundrect x="0" y="0" w="130" h="31" arcsize="5.993"/> <fillstroke/> <fillcolor color="#c7c7c7"/> <roundrect x="65" y="0" w="65" h="31" arcsize="7.147"/> <fillstroke/> <fontsize size="16"/> <fontstyle style="1"/> <text str="ON" x="32.5" y="15.5" align="center" valign="middle"/> </foreground> </shape> </shapes> ```
/content/code_sandbox/src/main/webapp/stencils/mockup/controls.xml
xml
2016-09-06T12:59:15
2024-08-16T13:28:41
drawio
jgraph/drawio
40,265
6,638
```xml // Native import path from 'path'; // Packages import test from 'ava'; import fs from 'fs-extra'; import {_electron} from 'playwright'; import type {ElectronApplication} from 'playwright'; let app: ElectronApplication; test.before(async () => { let pathToBinary; switch (process.platform) { case 'linux': pathToBinary = path.join(__dirname, '../dist/linux-unpacked/hyper'); break; case 'darwin': pathToBinary = path.join(__dirname, '../dist/mac/Hyper.app/Contents/MacOS/Hyper'); break; case 'win32': pathToBinary = path.join(__dirname, '../dist/win-unpacked/Hyper.exe'); break; default: throw new Error('Path to the built binary needs to be defined for this platform in test/index.js'); } app = await _electron.launch({ executablePath: pathToBinary }); await app.firstWindow(); await new Promise((resolve) => setTimeout(resolve, 5000)); }); test.after(async () => { await app .evaluate(({BrowserWindow}) => BrowserWindow.getFocusedWindow() ?.capturePage() .then((img) => img.toPNG().toString('base64')) ) .then((img) => Buffer.from(img || '', 'base64')) .then(async (imageBuffer) => { await fs.writeFile(`dist/tmp/${process.platform}_test.png`, imageBuffer); }); await app.close(); }); test('see if dev tools are open', async (t) => { t.false(await app.evaluate(({webContents}) => !!webContents.getFocusedWebContents()?.isDevToolsOpened())); }); ```
/content/code_sandbox/test/index.ts
xml
2016-07-01T06:01:21
2024-08-16T16:05:22
hyper
vercel/hyper
43,095
364
```xml <!-- path_to_url Unless required by applicable law or agreed to in writing, software WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. --> <animated-selector xmlns:android="path_to_url" xmlns:tools="path_to_url" tools:ignore="NewApi"> <item android:id="@+id/state_on" android:drawable="@drawable/vd_clock_alarm" android:state_checked="true"/> <item android:id="@+id/state_off" android:drawable="@drawable/vd_clock_alarm"/> <transition android:drawable="@drawable/avd_clock_alarm" android:fromId="@id/state_off" android:toId="@id/state_on"/> </animated-selector> ```
/content/code_sandbox/catalog/java/io/material/catalog/assets/res/drawable/asld_clock_alarm.xml
xml
2016-12-05T16:11:29
2024-08-16T17:51:42
material-components-android
material-components/material-components-android
16,176
164
```xml import { ElementUIComponent } from './component' /** Checkbox Button Component */ export declare class ElCheckboxButton extends ElementUIComponent { /** Value of the checkbox when used inside a checkbox-group */ label: string | number | boolean /** Value of the checkbox if it's checked */ trueLabel: string | number /** Value of the checkbox if it's not checked */ falseLabel: string | number /** Native 'name' attribute */ name: string /** If the checkbox is disabled */ disabled: boolean /** If the checkbox is checked */ checked: boolean } ```
/content/code_sandbox/types/checkbox-button.d.ts
xml
2016-09-03T06:19:26
2024-08-16T02:26:18
element
ElemeFE/element
54,066
128
```xml declare interface IMyAwardsWebPartStrings { PropertyPaneDescription: string; BasicGroupName: string; DescriptionFieldLabel: string; AppLocalEnvironmentSharePoint: string; AppLocalEnvironmentTeams: string; AppSharePointEnvironment: string; AppTeamsTabEnvironment: string; } declare module 'MyAwardsWebPartStrings' { const strings: IMyAwardsWebPartStrings; export = strings; } ```
/content/code_sandbox/samples/react-graph-profile-awards/src/webparts/myAwards/loc/mystrings.d.ts
xml
2016-08-30T17:21:43
2024-08-16T18:41:32
sp-dev-fx-webparts
pnp/sp-dev-fx-webparts
2,027
94
```xml <UserControl xmlns="path_to_url" xmlns:x="path_to_url" xmlns:mc="path_to_url" xmlns:d="path_to_url" xmlns:local="clr-namespace:Aurora.Settings.Layers" xmlns:xctk="path_to_url" xmlns:Controls="clr-namespace:Aurora.Controls" xmlns:logic="clr-namespace:Aurora.Settings.Overrides.Logic" x:Class="Aurora.Settings.Layers.Control_AnimationLayer" mc:Ignorable="d" Loaded="UserControl_Loaded"> <Grid> <GroupBox Header="Animation" Height="49" Width="590" HorizontalAlignment="Left" VerticalAlignment="Top"> <Grid> <Button x:Name="btnEditAnimation" Content="Edit Animation" HorizontalAlignment="Left" VerticalAlignment="Top" Click="btnEditAnimation_Click" Width="142" Height="23"/> <Label Content="Animation Duration:" Margin="0,-1,261,0" HorizontalAlignment="Right" VerticalAlignment="Top" Width="118"/> <xctk:DoubleUpDown x:Name="updownAnimationDuration" HorizontalAlignment="Right" Height="20" Margin="0,2,201,0" VerticalAlignment="Top" Width="60" Value="0" Minimum="0.1" Maximum="1024" Increment="0.1" ValueChanged="updownAnimationDuration_ValueChanged" /> <Label Content="secs" Margin="0,-1,169,0" HorizontalAlignment="Right" VerticalAlignment="Top"/> <Label Content="Repeat Times:" VerticalAlignment="Center" HorizontalAlignment="Right" Margin="0,-1,68,0" /> <xctk:IntegerUpDown x:Name="updownAnimationRepeat" HorizontalAlignment="Right" VerticalAlignment="Top" Margin="0,2,4,0" Width="60" Minimum="0" Maximum="1024" Increment="1" ValueChanged="updownAnimationRepeat_ValueChanged" /> </Grid> </GroupBox> <GroupBox Header="Keys" Margin="0,53,0,0" Width="242" HorizontalAlignment="Left"> <Grid> <CheckBox x:Name="chkboxForceKeySequence" Content="Display Only on Key Sequence keys" HorizontalAlignment="Left" Margin="0,0,0,0" VerticalAlignment="Top" Checked="chkboxForceKeySequence_Checked" Unchecked="chkboxForceKeySequence_Checked"/> <CheckBox x:Name="chkboxScaleToKeySequence" Content="Scale to Key Sequence bounds" HorizontalAlignment="Left" Margin="0,21,0,0" VerticalAlignment="Top" Checked="chkboxScaleToKeySequence_Checked" Unchecked="chkboxScaleToKeySequence_Checked"/> <Controls:KeySequence x:Name="KeySequence_keys" Margin="0,42,0,0" HorizontalAlignment="Left" Width="230" RecordingTag="SolidColorLayer" Title="Affected Keys" SequenceUpdated="KeySequence_keys_SequenceUpdated"/> </Grid> </GroupBox> <GroupBox x:Name="triggerGroupbox" Header="Trigger" Margin="257,53,0,0" Width="333" MinHeight="299" HorizontalAlignment="Left"> <ScrollViewer> <Grid> <Grid x:Name="triggerGridLayout"> <Grid.ColumnDefinitions> <ColumnDefinition Width="85px" /> <ColumnDefinition Width="1*" /> </Grid.ColumnDefinitions> <Grid.RowDefinitions> <RowDefinition Height="28px" /> <RowDefinition Height="28px" /> <RowDefinition Height="Auto"/> <RowDefinition Height="160px" /> <RowDefinition Height="28px" /> <RowDefinition Height="28px" /> <RowDefinition Height="28px" /> <RowDefinition Height="1*" /> </Grid.RowDefinitions> <Label Content="Trigger:" Grid.Row="0" VerticalAlignment="Center" HorizontalAlignment="Right" /> <ComboBox x:Name="triggerModeCb" Grid.Row="0" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" HorizontalAlignment="Stretch" DisplayMemberPath="Key" SelectedValuePath="Value" SelectionChanged="triggerMode_SelectionChanged"> <ComboBox.GroupStyle> <GroupStyle> <GroupStyle.HeaderTemplate> <DataTemplate> <TextBlock Text="{Binding Name}" Background="#1FFF" FontWeight="Bold" Margin="0,4,0,0" Padding="4,0,4,2" /> </DataTemplate> </GroupStyle.HeaderTemplate> </GroupStyle> </ComboBox.GroupStyle> </ComboBox> <Label Content="Trigger path:" Grid.Row="1" VerticalAlignment="Center" HorizontalAlignment="Right" /> <ComboBox x:Name="triggerPath" Grid.Row="1" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" Height="20" HorizontalAlignment="Stretch" IsEditable="True" TextBoxBase.TextChanged="triggerPath_TextChanged" /> <Label Content="Trigger expr:" Grid.Row="2" VerticalAlignment="Center" HorizontalAlignment="Right" /> <DockPanel Grid.Row="2" Grid.Column="1" LastChildFill="True"> <logic:Control_EvaluatableToolbox DockPanel.Dock="Bottom" Height="180" /> <logic:Control_EvaluatablePresenter x:Name="triggerEvaluatable" VerticalAlignment="Center" ExpressionChanged="triggerEvaluatable_ExpressionChanged" /> </DockPanel> <Label Content="Trigger keys:" Grid.Row="3" VerticalAlignment="Top" HorizontalAlignment="Right" /> <CheckBox x:Name="triggerAnyKey" Grid.Row="3" Grid.Column="1" Content="Trigger for any key" Margin="-6,6" Checked="triggerAnyKey_Checked" Unchecked="triggerAnyKey_Checked" /> <Controls:KeySequence x:Name="triggerKeys" Margin="0,28,0,0" Grid.Row="3" Grid.Column="1" RecordingTag="AnimationTriggerKeys" Title="Trigger keys" FreestyleEnabled="False" SequenceUpdated="triggerKeys_SequenceUpdated" /> <Label Content="Stack mode:" Grid.Row="5" VerticalAlignment="Center" HorizontalAlignment="Right" /> <CheckBox x:Name="translateToKey" Grid.Row="4" Grid.Column="1" Content="Translate to pressed key" Margin="-6,6" Checked="translateToKey_Checked" Unchecked="translateToKey_Checked" /> <TextBlock Text="?" Grid.Row="4" Grid.Column="4" ToolTip="Moves the top-left (0,0) of the animation to the location of the key. When using this option, ensure your animations are centered around 0,0." Cursor="Help" Opacity=".8" TextDecorations="Underline" Margin="12,6" VerticalAlignment="Center" HorizontalAlignment="Right" /> <ComboBox x:Name="stackModeCb" Grid.Row="5" Grid.Column="1" Margin="2,4" VerticalAlignment="Center" HorizontalAlignment="Stretch" SelectionChanged="stackModeCb_SelectionChanged" DisplayMemberPath="Key" SelectedValuePath="Value" /> <CheckBox x:Name="whileKeyHeldTerminate" Grid.Row="6" Grid.Column="1" Content="Stop as soon as key released" ToolTip="If true, this setting will stop the animation started by a key press as soon as that key press is released. If false, the animation started by a key will keep going until complete before stopping when the key is released." Margin="-6,6" Checked="whileKeyHeldTerminate_Checked" Unchecked="whileKeyHeldTerminate_Checked" /> </Grid> <Button Content=" i " Margin="0" HorizontalAlignment="Left" VerticalAlignment="Top" ToolTip="Open documentation page" Click="btnInfo_Click" /> </Grid> </ScrollViewer> </GroupBox> </Grid> </UserControl> ```
/content/code_sandbox/Project-Aurora/Project-Aurora/Settings/Layers/Control_AnimationLayer.xaml
xml
2016-04-04T05:18:18
2024-08-03T10:11:45
Aurora
antonpup/Aurora
1,824
1,705
```xml import { Column, Entity, JoinColumn, ManyToOne, PrimaryGeneratedColumn, } from "../../../../src" import { Parent } from "./Parent" @Entity("test_child") export class Child { @PrimaryGeneratedColumn({ name: "id", type: "int", }) public id: number @Column({ name: "parent_id", type: "int", }) public parentId: number @ManyToOne((type) => Parent, (parent) => parent.children) @JoinColumn({ name: "parent_id", referencedColumnName: "id", }) public parent: Parent @Column({ name: "data", type: "int", }) public data: number constructor(_data: number) { this.data = _data } } ```
/content/code_sandbox/test/github-issues/3105/entity/Child.ts
xml
2016-02-29T07:41:14
2024-08-16T18:28:52
typeorm
typeorm/typeorm
33,875
178
```xml import { ContentState, Modifier, SelectionState } from 'draft-js'; export default function removeBlock( contentState: ContentState, blockKey: string ): ContentState { const afterKey = contentState.getKeyAfter(blockKey); const afterBlock = contentState.getBlockForKey(afterKey); let targetRange; // Only if the following block the last with no text then the whole block // should be removed. Otherwise the block should be reduced to an unstyled block // without any characters. if ( afterBlock && afterBlock.getType() === 'unstyled' && afterBlock.getLength() === 0 && afterBlock === contentState.getBlockMap().last() ) { targetRange = new SelectionState({ anchorKey: blockKey, anchorOffset: 0, focusKey: afterKey, focusOffset: 0, }); } else { targetRange = new SelectionState({ anchorKey: blockKey, anchorOffset: 0, focusKey: blockKey, focusOffset: 1, }); } // change the blocktype and remove the characterList entry with the block const newContentState = Modifier.setBlockType( contentState, targetRange, 'unstyled' ); return Modifier.removeRange(newContentState, targetRange, 'backward'); } ```
/content/code_sandbox/packages/drag-n-drop/src/modifiers/removeBlock.ts
xml
2016-02-26T09:54:56
2024-08-16T18:16:31
draft-js-plugins
draft-js-plugins/draft-js-plugins
4,087
290
```xml <?xml version="1.0" encoding="UTF-8"?> <!--***********************************************************************--> <!-- $Id: vera.xml 6 2008-12-07 21:19:40Z seanoboyle $ --> <!--***********************************************************************--> <!-- This program is free software: you can redistribute it and/or modify --> <!-- (at your option) any later version. --> <!-- --> <!-- This program is distributed in the hope that it will be useful, --> <!-- but WITHOUT ANY WARRANTY; without even the implied warranty of --> <!-- MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the --> <!-- --> <!-- along with this program. If not, see <path_to_url <!-- --> <!--***********************************************************************--> <!-- Title: Vera Language Keywords File for Kate Editor --> <!-- Description: This file contains the Vera keywords defined in the --> <!-- OpenVera LRM: Testbench Ver 1.4.4 in the format expected--> <!-- by the Kate Editor. --> <!-- --> <!-- Original Author: Sean O'Boyle --> <!-- Contact: seanoboyle@intelligentdv.com --> <!-- Company: Intelligent Design Verification --> <!-- Company URL: path_to_url --> <!-- --> <!-- Download the most recent version here: --> <!-- path_to_url --> <!-- --> <!-- File Bugs Here: path_to_url --> <!-- Project: SyntaxKateVera --> <!-- --> <!-- File: vera.xml --> <!-- $LastChangedBy: seanoboyle $ --> <!-- $LastChangedDate: 2008-12-07 13:19:40 -0800 (Sun, 07 Dec 2008) $ --> <!-- $LastChangedRevision: 6 $ --> <!-- --> <!--***********************************************************************--> <!DOCTYPE language SYSTEM "language.dtd"> <language name="Vera" version="5" kateversion="5.0" section="Hardware" extensions="*.vr;*.vri;*.vrh" mimetype="text/x-vera-src" author="Sean O'Boyle (seanoboyle@intelligentdv.com)" license="GPLv3+"> <highlighting> <list name="keywords"> <item>after</item> <item>all</item> <item>any</item> <item>around</item> <item>assoc_index</item> <item>assoc_size</item> <item>async</item> <item>bad_state</item> <item>bad_trans</item> <item>before</item> <item>begin</item> <item>big_endian</item> <item>bind</item> <item>bin_activation</item> <item>bit_normal</item> <item>bit_reverse</item> <item>break</item> <item>breakpoint</item> <item>case</item> <item>casex</item> <item>casez</item> <item>class</item> <item>constraint</item> <item>continue</item> <item>coverage</item> <item>coverage_block</item> <item>coverage_def</item> <item>coverage_depth</item> <item>coverage_goal</item> <item>coverage_group</item> <item>coverage_option</item> <item>coverage_val</item> <item>cross_num_print_missing</item> <item>cross_auto_bin_max</item> <item>cov_comment</item> <item>default</item> <item>depth</item> <item>dist</item> <item>do</item> <item>else</item> <item>end</item> <item>enum</item> <item>exhaustive</item> <item>export</item> <item>extends</item> <item>extern</item> <item>for</item> <item>foreach</item> <item>fork</item> <item>function</item> <item>hdl_task</item> <item>hdl_node</item> <item>hide</item> <item>if</item> <item>illegal_self_transition</item> <item>illegal_state</item> <item>illegal_transition</item> <item>in</item> <item>interface</item> <item>invisible</item> <item>join</item> <item>little_endian</item> <item>local</item> <item>m_bad_state</item> <item>m_bad_trans</item> <item>m_state</item> <item>m_trans</item> <item>negedge</item> <item>new</item> <item>newcov</item> <item>non_rand</item> <item>none</item> <item>not</item> <item>null</item> <item>or</item> <item>ordered</item> <item>packed</item> <item>port</item> <item>posedge</item> <item>proceed</item> <item>prod</item> <item>prodget</item> <item>prodset</item> <item>program</item> <item>protected</item> <item>public</item> <item>rand</item> <item>randc</item> <item>randcase</item> <item>randseq</item> <item>repeat</item> <item>return</item> <item>rules</item> <item>sample</item> <item>sample_event</item> <item>shadow</item> <item>soft</item> <item>state</item> <item>static</item> <item>super</item> <item>task</item> <item>terminate</item> <item>this</item> <item>trans</item> <item>typedef</item> <item>unpacked</item> <item>var</item> <item>vca</item> <item>vector</item> <item>verilog_node</item> <item>verilog_task</item> <item>vhdl_node</item> <item>vhdl_task</item> <item>virtual</item> <item>virtuals</item> <item>visible</item> <item>void</item> <item>while</item> <item>wildcard</item> <item>with</item> </list> <list name="types"> <item>integer</item> <item>bit</item> <item>reg</item> <item>string</item> <item>bind_var</item> <item>event</item> <item>inout</item> <item>input</item> <item>output</item> <item>ASYNC</item> <item>CLOCK</item> <item>NDRIVE</item> <item>NHOLD</item> <item>NRX</item> <item>NRZ</item> <item>NR0</item> <item>NR1</item> <item>NSAMPLE</item> <item>PDRIVE</item> <item>PHOLD</item> <item>PRX</item> <item>PRZ</item> <item>PR0</item> <item>PR1</item> <item>PSAMPLE</item> </list> <list name="q_values"> <item>gnr</item> <item>grx</item> <item>grz</item> <item>gr0</item> <item>gr1</item> <item>nr</item> <item>rx</item> <item>rz</item> <item>r0</item> <item>r1</item> <item>snr</item> <item>srx</item> <item>srz</item> <item>sr0</item> <item>sr1</item> </list> <list name="methods"> <!-- system functions and tasks --> <item>alloc</item> <item>call_func</item> <item>call_task</item> <item>cast_assign</item> <item>close_conn</item> <item>cm_coverage</item> <item>cm_get_coverage</item> <item>cm_get_limit</item> <item>coverage_backup_database_file</item> <item>coverage_save_database</item> <item>delay</item> <item>error</item> <item>error_mode</item> <item>error_wait</item> <item>exit</item> <item>fclose</item> <item>feof</item> <item>ferror</item> <item>fflush</item> <item>flag</item> <item>fopen</item> <item>fprintf</item> <item>freadb</item> <item>freadb</item> <item>freadh</item> <item>freadstr</item> <item>get_bind</item> <item>get_bind_id</item> <item>get_conn_err</item> <item>get_cycle</item> <item>get_env</item> <item>get_memsize</item> <item>get_plus_arg</item> <item>get_systime</item> <item>get_time</item> <item>get_time_unit</item> <item>getstate</item> <item>initstate</item> <item>lock_file</item> <item>mailbox_get</item> <item>mailbox_put</item> <item>mailbox_receive</item> <item>mailbox_send</item> <item>make_client</item> <item>make_server</item> <item>os_command</item> <item>printf</item> <item>psprintf</item> <item>query</item> <item>query_str</item> <item>query_x</item> <item>rand48</item> <item>random</item> <item>region_enter</item> <item>region_exit</item> <item>rewind</item> <item>semaphore_get</item> <item>semaphore_put</item> <item>setstate</item> <item>signal_connect</item> <item>simwave_plot</item> <item>srandom</item> <item>sprintf</item> <item>sscanf</item> <item>stop</item> <item>suspend_thread</item> <item>sync</item> <item>timeout</item> <item>trace</item> <item>trigger</item> <item>unit_delay</item> <item>unlock_file</item> <item>up_connections</item> <item>urand48</item> <item>urandom</item> <item>urandom_range</item> <item>vera_bit_reverse</item> <item>vera_crc</item> <item>vera_pack</item> <item>vera_pack_big_endian</item> <item>vera_plot</item> <item>vera_report_profile</item> <item>vera_unpack</item> <item>vera_unpack_big_endian</item> <item>vsv_call_func</item> <item>vsv_call_task</item> <item>vsv_close_conn</item> <item>vsv_get_conn_err</item> <item>vsv_make_client</item> <item>vsv_make_server</item> <item>vsv_up_connections</item> <item>vsv_wait_for_done</item> <item>vsv_wait_for_input</item> <item>wait_child</item> <item>wait_var</item> <!-- class methods --> <item>Configure</item> <item>DisableTrigger</item> <item>DoAction</item> <item>EnableCount</item> <item>EnableTrigger</item> <item>Event</item> <item>GetAssert</item> <item>GetCount</item> <item>GetFirstAssert</item> <item>GetName</item> <item>GetNextAssert</item> <item>Wait</item> <item>atobin</item> <item>atohex</item> <item>atoi</item> <item>atooct</item> <item>backref</item> <item>bittostr</item> <item>capacity</item> <item>compare</item> <item>constraint_mode</item> <item>delete</item> <item>empty</item> <item>find</item> <item>find_index</item> <item>first</item> <item>first_index</item> <item>get_at_least</item> <item>get_auto_bin</item> <item>get_cov_weight</item> <item>get_coverage_goal</item> <item>get_cross_bin_max</item> <item>get_status</item> <item>get_status_msg</item> <item>getc</item> <item>hash</item> <item>icompare</item> <item>insert</item> <item>inst_get_at_least</item> <item>inst_get_auto_bin_max</item> <item>inst_get_collect</item> <item>inst_get_cov_weight</item> <item>inst_get_coverage_goal</item> <item>inst_getcross_bin_max</item> <item>inst_query</item> <item>inst_set_at_least</item> <item>inst_set_auto_bin_max</item> <item>inst_set_bin_activiation</item> <item>inst_set_collect</item> <item>inst_set_cov_weight</item> <item>inst_set_coverage_goal</item> <item>inst_set_cross_bin_max</item> <item>itoa</item> <item>last</item> <item>last_index</item> <item>len</item> <item>load</item> <item>match</item> <item>max</item> <item>max_index</item> <item>min</item> <item>min_index</item> <item>object_compare</item> <item>object_copy</item> <item>object_print</item> <item>pack</item> <item>pick_index</item> <item>pop_back</item> <item>pop_front</item> <item>post_pack</item> <item>post_randomize</item> <item>post_unpack</item> <item>postmatch</item> <item>pre_pack</item> <item>pre_randomize</item> <item>prematch</item> <item>push_back</item> <item>push_front</item> <item>putc</item> <item>query</item> <item>query_str</item> <item>rand_mode</item> <item>randomize</item> <item>reserve</item> <item>reverse</item> <item>rsort</item> <item>search</item> <item>set_at_least</item> <item>set_auto_bin_max</item> <item>set_bin_activiation</item> <item>set_cov_weight</item> <item>set_coverage_goal</item> <item>set_cross_bin_max</item> <item>set_name</item> <item>size</item> <item>sort</item> <item>substr</item> <item>sum</item> <item>thismatch</item> <item>tolower</item> <item>toupper</item> <item>unique_index</item> <item>unpack</item> <!-- empty methods --> <item>new</item> <item>object_compare</item> <item>post_boundary</item> <item>post_pack</item> <item>post_randomize</item> <item>post_unpack</item> <item>pre-randomize</item> <item>pre_boundary</item> <item>pre_pack</item> <item>pre_unpack</item> <!-- vera-constants --> <item>ALL</item> <item>ANY</item> <item>BAD_STATE</item> <item>BAD_TRANS</item> <item>CALL</item> <item>CHECK</item> <item>CHGEDGE</item> <item>CLEAR</item> <item>COPY_NO_WAIT</item> <item>COPY_WAIT</item> <item>CROSS</item> <item>CROSS_TRANS</item> <item>DEBUG</item> <item>DELETE</item> <item>EC_ARRAYX</item> <item>EC_CODE_END</item> <item>EC_CONFLICT</item> <item>EC_EVNTIMOUT</item> <item>EC_EXPECT</item> <item>EC_FULLEXPECT</item> <item>EC_MBXTMOUT</item> <item>EC_NEXPECT</item> <item>EC_RETURN</item> <item>EC_RGNTMOUT</item> <item>EC_SCONFLICT</item> <item>EC_SEMTMOUT</item> <item>EC_SEXPECT</item> <item>EC_SFULLEXPECT</item> <item>EC_SNEXTPECT</item> <item>EC_USERSET</item> <item>EQ</item> <item>EVENT</item> <item>FAIL</item> <item>FIRST</item> <item>FORK</item> <item>GE</item> <item>GOAL</item> <item>GT</item> <item>HAND_SHAKE</item> <item>HI</item> <item>HIGH</item> <item>HNUM</item> <item>LE</item> <item>LIC_EXIT</item> <item>LIC_PRERR</item> <item>LIC_PRWARN</item> <item>LIC_WAIT</item> <item>LO</item> <item>LOAD</item> <item>LOW</item> <item>LT</item> <item>MAILBOX</item> <item>MAX_COM</item> <item>NAME</item> <item>NE</item> <item>NEGEDGE</item> <item>NEXT</item> <item>NO_OVERLAP</item> <item>NO_OVERLAP_STATE</item> <item>NO_OVERLAP_TRANS</item> <item>NO_VARS</item> <item>NO_WAIT</item> <item>NUM</item> <item>NUM_BIN</item> <item>NUM_DET</item> <item>OFF</item> <item>OK</item> <item>OK_LAST</item> <item>ON</item> <item>ONE_BLAST</item> <item>ONE_SHOT</item> <item>ORDER</item> <item>PAST_IT</item> <item>PERCENT</item> <item>POSEDGE</item> <item>PROGRAM</item> <item>RAWIN</item> <item>REGION</item> <item>REPORT</item> <item>SAMPLE</item> <item>SAVE</item> <item>SEMAPHORE</item> <item>SET</item> <item>SILENT</item> <item>STATE</item> <item>STR</item> <item>STR_ERR_OUT_OF_RANGE</item> <item>STR_ERR_REGEXP_SYNTAX</item> <item>SUM</item> <item>TRANS</item> <item>VERBOSE</item> <item>WAIT</item> <item>stderr</item> <item>stdin</item> <item>stdout</item> </list> <contexts> <context attribute="Normal Text" lineEndContext="#stay" name="Normal"> <DetectSpaces /> <RegExpr attribute="Preprocessor" context="Outscoped" String="#\s*if\s+0" beginRegion="PP" firstNonSpace="true" /> <DetectChar context="AfterHash" char="#" firstNonSpace="true" lookAhead="true" /> <keyword attribute="Keyword" context="#stay" String="keywords"/> <keyword attribute="Data Type" context="#stay" String="types"/> <keyword attribute="Q Values" context="#stay" String="q_values"/> <keyword attribute="Methods" context="#stay" String="methods"/> <DetectChar attribute="String" context="String" char="&quot;"/> <RegExpr attribute="Decimal" context="#stay" String="[\d_]*'d[\d_]+"/> <RegExpr attribute="Octal" context="#stay" String="[\d_]*'o[0-7xXzZ_]+"/> <RegExpr attribute="Hex" context="#stay" String="[\d_]*'h[\da-fA-FxXzZ_]+"/> <RegExpr attribute="Binary" context="#stay" String="[\d_]*'b[01_zZxX]+"/> <Float attribute="Float" context="#stay"/> <Int attribute="Decimal" context="#stay"/> <IncludeRules context="##Doxygen" /> <Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/> <Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/> <DetectChar attribute="Symbol" context="#stay" char="{" beginRegion="Brace1" /> <DetectChar attribute="Symbol" context="#stay" char="}" endRegion="Brace1" /> <AnyChar attribute="Symbol" context="#stay" String=":!%&amp;()+,-/.*&lt;=&gt;?[]{|}~^&#59;"/> </context> <context attribute="String" lineEndContext="#pop" name="String"> <LineContinue attribute="String" context="#stay"/> <HlCStringChar attribute="String Char" context="#stay"/> <DetectChar attribute="String" context="#pop" char="&quot;"/> </context> <context attribute="Comment" lineEndContext="#pop" name="Commentar 1"> <LineContinue attribute="Comment" context="#stay"/> <DetectSpaces /> <IncludeRules context="##Alerts" /> <DetectIdentifier /> </context> <context attribute="Comment" lineEndContext="#stay" name="Commentar 2"> <DetectSpaces /> <Detect2Chars attribute="Comment" context="#pop" char="*" char1="/" endRegion="Comment"/> <IncludeRules context="##Alerts" /> <DetectIdentifier /> </context> <context attribute="Error" lineEndContext="#pop" name="AfterHash"> <!-- define, elif, else, endif, error, if, ifdef, ifndef, include, include_next, line, pragma, undef, warning --> <RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*if(?:def|ndef)?(?=\s+\S)" insensitive="true" beginRegion="PP" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*endif" insensitive="true" endRegion="PP" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="Define" String="#\s*define.*((?=\\))" insensitive="true" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s*(?:el(?:se|if)|include(?:_next)?|define|undef|line|error|warning|pragma)" insensitive="true" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="Preprocessor" String="#\s+[0-9]+" insensitive="true" firstNonSpace="true" /> </context> <context attribute="Preprocessor" lineEndContext="#pop" name="Preprocessor"> <LineContinue attribute="Preprocessor" context="#stay"/> <RangeDetect attribute="Prep. Lib" context="#stay" char="&quot;" char1="&quot;"/> <RangeDetect attribute="Prep. Lib" context="#stay" char="&lt;" char1="&gt;"/> <IncludeRules context="##Doxygen" /> <Detect2Chars attribute="Comment" context="Commentar/Preprocessor" char="/" char1="*" beginRegion="Comment2" /> <Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/> </context> <context attribute="Preprocessor" lineEndContext="#pop" name="Define"> <LineContinue attribute="Preprocessor" context="#stay"/> </context> <context attribute="Comment" lineEndContext="#stay" name="Commentar/Preprocessor"> <DetectSpaces /> <Detect2Chars attribute="Comment" context="#pop" char="*" char1="/" endRegion="Comment2" /> <DetectIdentifier /> </context> <context attribute="Comment" lineEndContext="#stay" name="Outscoped" > <DetectSpaces /> <IncludeRules context="##Alerts" /> <DetectIdentifier /> <DetectChar attribute="String" context="String" char="&quot;"/> <IncludeRules context="##Doxygen" /> <Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/> <Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/> <RegExpr attribute="Comment" context="Outscoped intern" String="#\s*if" beginRegion="PP" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="#pop" String="#\s*el(?:se|if)" firstNonSpace="true" /> <RegExpr attribute="Preprocessor" context="#pop" String="#\s*endif" endRegion="PP" firstNonSpace="true" /> </context> <context attribute="Comment" lineEndContext="#stay" name="Outscoped intern"> <DetectSpaces /> <IncludeRules context="##Alerts" /> <DetectIdentifier /> <DetectChar attribute="String" context="String" char="&quot;"/> <IncludeRules context="##Doxygen" /> <Detect2Chars attribute="Comment" context="Commentar 1" char="/" char1="/"/> <Detect2Chars attribute="Comment" context="Commentar 2" char="/" char1="*" beginRegion="Comment"/> <RegExpr attribute="Comment" context="Outscoped intern" String="#\s*if" beginRegion="PP" firstNonSpace="true" /> <RegExpr attribute="Comment" context="#pop" String="#\s*endif" endRegion="PP" firstNonSpace="true" /> </context> </contexts> <itemDatas> <itemData name="Normal Text" defStyleNum="dsNormal"/> <itemData name="Keyword" defStyleNum="dsKeyword"/> <itemData name="Q Values" defStyleNum="dsKeyword"/> <itemData name="Methods" defStyleNum="dsKeyword"/> <itemData name="Data Type" defStyleNum="dsDataType"/> <itemData name="Decimal" defStyleNum="dsDecVal"/> <itemData name="Octal" defStyleNum="dsBaseN"/> <itemData name="Hex" defStyleNum="dsBaseN"/> <itemData name="Float" defStyleNum="dsFloat"/> <itemData name="Binary" defStyleNum="dsOthers"/> <itemData name="String" defStyleNum="dsString"/> <itemData name="String Char" defStyleNum="dsSpecialChar"/> <itemData name="Comment" defStyleNum="dsComment"/> <itemData name="Symbol" defStyleNum="dsNormal"/> <itemData name="Preprocessor" defStyleNum="dsPreprocessor"/> <itemData name="Prep. Lib" defStyleNum="dsPreprocessor"/> <itemData name="Error" defStyleNum="dsError" /> </itemDatas> </highlighting> <general> <comments> <comment name="singleLine" start="//" /> <comment name="multiLine" start="/*" end="*/" region="Comment"/> </comments> <keywords casesensitive="1"/> </general> </language> ```
/content/code_sandbox/src/data/extra/syntax-highlighting/syntax/vera.xml
xml
2016-10-05T07:24:54
2024-08-16T05:03:40
vnote
vnotex/vnote
11,687
6,586
```xml /* your_sha256_hash------------- |your_sha256_hash------------*/ /** * @packageDocumentation * @module apputils-extension */ import { ILayoutRestorer, IRouter, JupyterFrontEnd, JupyterFrontEndPlugin } from '@jupyterlab/application'; import { Dialog, ICommandPalette, ISanitizer, ISessionContextDialogs, ISplashScreen, IWindowResolver, MainAreaWidget, Printing, Sanitizer, SessionContextDialogs, WindowResolver } from '@jupyterlab/apputils'; import { PageConfig, PathExt, URLExt } from '@jupyterlab/coreutils'; import { ISettingRegistry } from '@jupyterlab/settingregistry'; import { IStateDB, StateDB } from '@jupyterlab/statedb'; import { ITranslator, nullTranslator } from '@jupyterlab/translation'; import { jupyterFaviconIcon } from '@jupyterlab/ui-components'; import { PromiseDelegate } from '@lumino/coreutils'; import { DisposableDelegate } from '@lumino/disposable'; import { Debouncer, Throttler } from '@lumino/polling'; import { announcements } from './announcements'; import { notificationPlugin } from './notificationplugin'; import { Palette } from './palette'; import { settingsPlugin } from './settingsplugin'; import { kernelStatus, runningSessionsStatus } from './statusbarplugin'; import { themesPaletteMenuPlugin, themesPlugin } from './themesplugins'; import { toolbarRegistry } from './toolbarregistryplugin'; import { workspacesPlugin } from './workspacesplugin'; import { IRenderMime } from '@jupyterlab/rendermime-interfaces'; import { displayShortcuts } from './shortcuts'; /** * The interval in milliseconds before recover options appear during splash. */ const SPLASH_RECOVER_TIMEOUT = 12000; /** * The command IDs used by the apputils plugin. */ namespace CommandIDs { export const loadState = 'apputils:load-statedb'; export const print = 'apputils:print'; export const reset = 'apputils:reset'; export const resetOnLoad = 'apputils:reset-on-load'; export const runFirstEnabled = 'apputils:run-first-enabled'; export const runAllEnabled = 'apputils:run-all-enabled'; export const toggleHeader = 'apputils:toggle-header'; export const displayShortcuts = 'apputils:display-shortcuts'; } /** * The default command palette extension. */ const palette: JupyterFrontEndPlugin<ICommandPalette> = { id: '@jupyterlab/apputils-extension:palette', description: 'Provides the command palette.', autoStart: true, requires: [ITranslator], provides: ICommandPalette, optional: [ISettingRegistry], activate: ( app: JupyterFrontEnd, translator: ITranslator, settingRegistry: ISettingRegistry | null ) => { return Palette.activate(app, translator, settingRegistry); } }; /** * The default command palette's restoration extension. * * #### Notes * The command palette's restoration logic is handled separately from the * command palette provider extension because the layout restorer dependency * causes the command palette to be unavailable to other extensions earlier * in the application load cycle. */ const paletteRestorer: JupyterFrontEndPlugin<void> = { id: '@jupyterlab/apputils-extension:palette-restorer', description: 'Restores the command palette.', autoStart: true, requires: [ILayoutRestorer, ITranslator], activate: ( app: JupyterFrontEnd, restorer: ILayoutRestorer, translator: ITranslator ) => { Palette.restore(app, restorer, translator); } }; /** * The default window name resolver provider. */ const resolver: JupyterFrontEndPlugin<IWindowResolver> = { id: '@jupyterlab/apputils-extension:resolver', description: 'Provides the window name resolver.', autoStart: true, provides: IWindowResolver, requires: [JupyterFrontEnd.IPaths, IRouter], activate: async ( app: JupyterFrontEnd, paths: JupyterFrontEnd.IPaths, router: IRouter ) => { const { hash, search } = router.current; const query = URLExt.queryStringToObject(search || ''); const solver = new WindowResolver(); const workspace = PageConfig.getOption('workspace'); const treePath = PageConfig.getOption('treePath'); const mode = PageConfig.getOption('mode') === 'multiple-document' ? 'lab' : 'doc'; // This is used as a key in local storage to refer to workspaces, either the name // of the workspace or the string PageConfig.defaultWorkspace. Both lab and doc modes share the same workspace. const candidate = workspace ? workspace : PageConfig.defaultWorkspace; const rest = treePath ? URLExt.join('tree', treePath) : ''; try { await solver.resolve(candidate); return solver; } catch (error) { // Window resolution has failed so the URL must change. Return a promise // that never resolves to prevent the application from loading plugins // that rely on `IWindowResolver`. return new Promise<IWindowResolver>(() => { const { base } = paths.urls; const pool = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789'; const random = pool[Math.floor(Math.random() * pool.length)]; let path = URLExt.join(base, mode, 'workspaces', `auto-${random}`); path = rest ? URLExt.join(path, URLExt.encodeParts(rest)) : path; // Reset the workspace on load. query['reset'] = ''; const url = path + URLExt.objectToQueryString(query) + (hash || ''); router.navigate(url, { hard: true }); }); } } }; /** * The default splash screen provider. */ const splash: JupyterFrontEndPlugin<ISplashScreen> = { id: '@jupyterlab/apputils-extension:splash', description: 'Provides the splash screen.', autoStart: true, requires: [ITranslator], provides: ISplashScreen, activate: (app: JupyterFrontEnd, translator: ITranslator) => { const trans = translator.load('jupyterlab'); const { commands, restored } = app; // Create splash element and populate it. const splash = document.createElement('div'); const galaxy = document.createElement('div'); const logo = document.createElement('div'); splash.id = 'jupyterlab-splash'; galaxy.id = 'galaxy'; logo.id = 'main-logo'; jupyterFaviconIcon.element({ container: logo, stylesheet: 'splash' }); galaxy.appendChild(logo); ['1', '2', '3'].forEach(id => { const moon = document.createElement('div'); const planet = document.createElement('div'); moon.id = `moon${id}`; moon.className = 'moon orbit'; planet.id = `planet${id}`; planet.className = 'planet'; moon.appendChild(planet); galaxy.appendChild(moon); }); splash.appendChild(galaxy); // Create debounced recovery dialog function. let dialog: Dialog<unknown> | null; const recovery = new Throttler( async () => { if (dialog) { return; } dialog = new Dialog({ title: trans.__('Loading'), body: trans.__(`The loading screen is taking a long time. Would you like to clear the workspace or keep waiting?`), buttons: [ Dialog.cancelButton({ label: trans.__('Keep Waiting') }), Dialog.warnButton({ label: trans.__('Clear Workspace') }) ] }); try { const result = await dialog.launch(); dialog.dispose(); dialog = null; if (result.button.accept && commands.hasCommand(CommandIDs.reset)) { return commands.execute(CommandIDs.reset); } // Re-invoke the recovery timer in the next frame. requestAnimationFrame(() => { // Because recovery can be stopped, handle invocation rejection. void recovery.invoke().catch(_ => undefined); }); } catch (error) { /* no-op */ } }, { limit: SPLASH_RECOVER_TIMEOUT, edge: 'trailing' } ); // Return ISplashScreen. let splashCount = 0; return { show: (light = true) => { splash.classList.remove('splash-fade'); splash.classList.toggle('light', light); splash.classList.toggle('dark', !light); splashCount++; document.body.appendChild(splash); // Because recovery can be stopped, handle invocation rejection. void recovery.invoke().catch(_ => undefined); return new DisposableDelegate(async () => { await restored; if (--splashCount === 0) { void recovery.stop(); if (dialog) { dialog.dispose(); dialog = null; } splash.classList.add('splash-fade'); window.setTimeout(() => { document.body.removeChild(splash); }, 200); } }); } }; } }; const print: JupyterFrontEndPlugin<void> = { id: '@jupyterlab/apputils-extension:print', description: 'Add the print capability', autoStart: true, requires: [ITranslator], activate: (app: JupyterFrontEnd, translator: ITranslator) => { const trans = translator.load('jupyterlab'); app.commands.addCommand(CommandIDs.print, { label: trans.__('Print'), isEnabled: () => { const widget = app.shell.currentWidget; return Printing.getPrintFunction(widget) !== null; }, execute: async () => { const widget = app.shell.currentWidget; const printFunction = Printing.getPrintFunction(widget); if (printFunction) { await printFunction(); } } }); app.shell.currentChanged?.connect(() => { app.commands.notifyCommandChanged(CommandIDs.print); }); } }; export const toggleHeader: JupyterFrontEndPlugin<void> = { id: '@jupyterlab/apputils-extension:toggle-header', description: 'Adds a command to display the main area widget content header.', autoStart: true, requires: [ITranslator], optional: [ICommandPalette], activate: ( app: JupyterFrontEnd, translator: ITranslator, palette: ICommandPalette | null ) => { const trans = translator.load('jupyterlab'); const category: string = trans.__('Main Area'); app.commands.addCommand(CommandIDs.toggleHeader, { label: trans.__('Show Header Above Content'), isEnabled: () => app.shell.currentWidget instanceof MainAreaWidget && !app.shell.currentWidget.contentHeader.isDisposed && app.shell.currentWidget.contentHeader.widgets.length > 0, isToggled: () => { const widget = app.shell.currentWidget; return widget instanceof MainAreaWidget ? !widget.contentHeader.isHidden : false; }, execute: async () => { const widget = app.shell.currentWidget; if (widget instanceof MainAreaWidget) { widget.contentHeader.setHidden(!widget.contentHeader.isHidden); } } }); app.shell.currentChanged?.connect(() => { app.commands.notifyCommandChanged(CommandIDs.toggleHeader); }); if (palette) { palette.addItem({ command: CommandIDs.toggleHeader, category }); } } }; /** * Update the browser title based on the workspace and the current * active item. */ async function updateTabTitle(workspace: string, db: IStateDB, name: string) { const data: any = await db.toJSON(); let current: string = data['layout-restorer:data']?.main?.current; if (current === undefined) { document.title = `${PageConfig.getOption('appName') || 'JupyterLab'}${ workspace.startsWith('auto-') ? ` (${workspace})` : `` }`; } else { // File name from current path let currentFile: string = PathExt.basename( decodeURIComponent(window.location.href) ); // Truncate to first 12 characters of current document name + ... if length > 15 currentFile = currentFile.length > 15 ? currentFile.slice(0, 12).concat(``) : currentFile; // Number of restorable items that are either notebooks or editors const count: number = Object.keys(data).filter( item => item.startsWith('notebook') || item.startsWith('editor') ).length; if (workspace.startsWith('auto-')) { document.title = `${currentFile} (${workspace}${ count > 1 ? ` : ${count}` : `` }) - ${name}`; } else { document.title = `${currentFile}${ count > 1 ? ` (${count})` : `` } - ${name}`; } } } /** * The default state database for storing application state. * * #### Notes * If this extension is loaded with a window resolver, it will automatically add * state management commands, URL support for `clone` and `reset`, and workspace * auto-saving. Otherwise, it will return a simple in-memory state database. */ const state: JupyterFrontEndPlugin<IStateDB> = { id: '@jupyterlab/apputils-extension:state', description: 'Provides the application state. It is stored per workspaces.', autoStart: true, provides: IStateDB, requires: [JupyterFrontEnd.IPaths, IRouter, ITranslator], optional: [IWindowResolver], activate: ( app: JupyterFrontEnd, paths: JupyterFrontEnd.IPaths, router: IRouter, translator: ITranslator, resolver: IWindowResolver | null ) => { const trans = translator.load('jupyterlab'); if (resolver === null) { return new StateDB(); } let resolved = false; const { commands, name, serviceManager } = app; const { workspaces } = serviceManager; const workspace = resolver.name; const transform = new PromiseDelegate<StateDB.DataTransform>(); const db = new StateDB({ transform: transform.promise }); const save = new Debouncer(async () => { const id = workspace; const metadata = { id }; const data = await db.toJSON(); await workspaces.save(id, { data, metadata }); }); // Any time the local state database changes, save the workspace. db.changed.connect(() => void save.invoke(), db); db.changed.connect(() => updateTabTitle(workspace, db, name)); commands.addCommand(CommandIDs.loadState, { label: trans.__('Load state for the current workspace.'), execute: async (args: IRouter.ILocation) => { // Since the command can be executed an arbitrary number of times, make // sure it is safe to call multiple times. if (resolved) { return; } const { hash, path, search } = args; const query = URLExt.queryStringToObject(search || ''); const clone = typeof query['clone'] === 'string' ? query['clone'] === '' ? PageConfig.defaultWorkspace : query['clone'] : null; const source = clone || workspace || null; if (source === null) { console.error(`${CommandIDs.loadState} cannot load null workspace.`); return; } try { const saved = await workspaces.fetch(source); // If this command is called after a reset, the state database // will already be resolved. if (!resolved) { resolved = true; transform.resolve({ type: 'overwrite', contents: saved.data }); } } catch ({ message }) { console.warn(`Fetching workspace "${workspace}" failed.`, message); // If the workspace does not exist, cancel the data transformation // and save a workspace with the current user state data. if (!resolved) { resolved = true; transform.resolve({ type: 'cancel', contents: null }); } } if (source === clone) { // Maintain the query string parameters but remove `clone`. delete query['clone']; const url = path + URLExt.objectToQueryString(query) + hash; const cloned = save.invoke().then(() => router.stop); // After the state has been cloned, navigate to the URL. void cloned.then(() => { router.navigate(url); }); return cloned; } // After the state database has finished loading, save it. await save.invoke(); } }); commands.addCommand(CommandIDs.reset, { label: trans.__('Reset Application State'), execute: async ({ reload }: { reload: boolean }) => { await db.clear(); await save.invoke(); if (reload) { router.reload(); } } }); commands.addCommand(CommandIDs.resetOnLoad, { label: trans.__('Reset state when loading for the workspace.'), execute: (args: IRouter.ILocation) => { const { hash, path, search } = args; const query = URLExt.queryStringToObject(search || ''); const reset = 'reset' in query; const clone = 'clone' in query; if (!reset) { return; } // If the state database has already been resolved, resetting is // impossible without reloading. if (resolved) { return router.reload(); } // Empty the state database. resolved = true; transform.resolve({ type: 'clear', contents: null }); // Maintain the query string parameters but remove `reset`. delete query['reset']; const url = path + URLExt.objectToQueryString(query) + hash; const cleared = db.clear().then(() => save.invoke()); // After the state has been reset, navigate to the URL. if (clone) { void cleared.then(() => { router.navigate(url, { hard: true }); }); } else { void cleared.then(() => { router.navigate(url); }); } return cleared; } }); router.register({ command: CommandIDs.loadState, pattern: /.?/, rank: 30 // High priority: 30:100. }); router.register({ command: CommandIDs.resetOnLoad, pattern: /(\?reset|\&reset)($|&)/, rank: 20 // High priority: 20:100. }); return db; } }; /** * The default session context dialogs extension. */ const sessionDialogs: JupyterFrontEndPlugin<ISessionContextDialogs> = { id: '@jupyterlab/apputils-extension:sessionDialogs', description: 'Provides the session context dialogs.', provides: ISessionContextDialogs, optional: [ITranslator, ISettingRegistry], autoStart: true, activate: async ( app: JupyterFrontEnd, translator: ITranslator | null, settingRegistry: ISettingRegistry | null ) => { return new SessionContextDialogs({ translator: translator ?? nullTranslator, settingRegistry: settingRegistry ?? null }); } }; /** * Utility commands */ const utilityCommands: JupyterFrontEndPlugin<void> = { id: '@jupyterlab/apputils-extension:utilityCommands', description: 'Adds meta commands to run set of other commands.', requires: [ITranslator], optional: [ICommandPalette], autoStart: true, activate: ( app: JupyterFrontEnd, translator: ITranslator, palette: ICommandPalette | null ) => { const trans = translator.load('jupyterlab'); const { commands } = app; commands.addCommand(CommandIDs.runFirstEnabled, { label: trans.__('Run First Enabled Command'), execute: args => { const commands: string[] = args.commands as string[]; const commandArgs: any = args.args; const argList = Array.isArray(args); for (let i = 0; i < commands.length; i++) { const cmd = commands[i]; const arg = argList ? commandArgs[i] : commandArgs; if (app.commands.isEnabled(cmd, arg)) { return app.commands.execute(cmd, arg); } } } }); // Add a command for taking lists of commands and command arguments // and running all the enabled commands. commands.addCommand(CommandIDs.runAllEnabled, { label: trans.__('Run All Enabled Commands Passed as Args'), execute: async args => { const commands: string[] = (args.commands as string[]) ?? []; const commandArgs: any = args.args; const argList = Array.isArray(args); const errorIfNotEnabled: boolean = (args.errorIfNotEnabled as boolean) ?? false; for (let i = 0; i < commands.length; i++) { const cmd = commands[i]; const arg = argList ? commandArgs[i] : commandArgs; if (app.commands.isEnabled(cmd, arg)) { await app.commands.execute(cmd, arg); } else { if (errorIfNotEnabled) { console.error(`${cmd} is not enabled.`); } } } }, isEnabled: args => { const commands: string[] = (args.commands as string[]) ?? []; const commandArgs: any = args.args; const argList = Array.isArray(args); return commands.some((cmd, idx) => app.commands.isEnabled(cmd, argList ? commandArgs[idx] : commandArgs) ); } }); commands.addCommand(CommandIDs.displayShortcuts, { label: trans.__('Show Keyboard Shortcuts'), caption: trans.__( 'Show relevant keyboard shortcuts for the current active widget' ), execute: args => { const currentWidget = app.shell.currentWidget; const included = currentWidget?.node.contains(document.activeElement); if (!included && currentWidget instanceof MainAreaWidget) { const currentNode = currentWidget.content.node ?? currentWidget?.node; currentNode?.focus(); } const options = { commands, trans }; return displayShortcuts(options); } }); if (palette) { const category: string = trans.__('Help'); palette.addItem({ command: CommandIDs.displayShortcuts, category }); } } }; /** * The default HTML sanitizer. */ const sanitizer: JupyterFrontEndPlugin<IRenderMime.ISanitizer> = { id: '@jupyterlab/apputils-extension:sanitizer', description: 'Provides the HTML sanitizer.', autoStart: true, provides: ISanitizer, requires: [ISettingRegistry], activate: ( app: JupyterFrontEnd, settings: ISettingRegistry ): IRenderMime.ISanitizer => { const sanitizer = new Sanitizer(); const loadSetting = (setting: ISettingRegistry.ISettings): void => { const allowedSchemes = setting.get('allowedSchemes') .composite as Array<string>; const autolink = setting.get('autolink').composite as boolean; if (allowedSchemes) { sanitizer.setAllowedSchemes(allowedSchemes); } sanitizer.setAutolink(autolink); }; // Wait for the application to be restored and // for the settings for this plugin to be loaded settings .load('@jupyterlab/apputils-extension:sanitizer') .then(setting => { // Read the settings loadSetting(setting); // Listen for your plugin setting changes using Signal setting.changed.connect(loadSetting); }) .catch(reason => { console.error(`Failed to load sanitizer settings:`, reason); }); return sanitizer; } }; /** * Export the plugins as default. */ const plugins: JupyterFrontEndPlugin<any>[] = [ announcements, kernelStatus, notificationPlugin, palette, paletteRestorer, print, resolver, runningSessionsStatus, sanitizer, settingsPlugin, state, splash, sessionDialogs, themesPlugin, themesPaletteMenuPlugin, toggleHeader, toolbarRegistry, utilityCommands, workspacesPlugin ]; export default plugins; ```
/content/code_sandbox/packages/apputils-extension/src/index.ts
xml
2016-06-03T20:09:17
2024-08-16T19:12:44
jupyterlab
jupyterlab/jupyterlab
14,019
5,235
```xml <?xml version="1.0" encoding="utf-8"?> <!-- ~ ~ ~ path_to_url ~ ~ Unless required by applicable law or agreed to in writing, software ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. --> <resources> <string name="item_view_role_description">Guia</string> </resources> ```
/content/code_sandbox/lib/java/com/google/android/material/resources/res/values-pt-rBR/strings.xml
xml
2016-12-05T16:11:29
2024-08-16T17:51:42
material-components-android
material-components/material-components-android
16,176
84
```xml <Documentation> <Docs DocId="T:CoreImage.CISixfoldRotatedTile"> <summary>A <see cref="T:CoreImage.CITileFilter" /> that rotates the image in 60-degree increments.</summary> <remarks> <para>The following example shows this filter in use</para> <example> <code lang="csharp lang-csharp"><![CDATA[ // Create the CIImage from a file CIImage flower = CIImage.FromCGImage (UIImage.FromFile ("flower.png").CGImage); // Create a CISixfoldRotatedTile filter with the input image var sixfold_rotated_tile = new CISixfoldRotatedTile () { Image = flower }; // Get the altered image from the filter var output = new CICrop { Image = sixfold_rotated_tile.OutputImage, Rectangle = new CIVector (0, 0, 400, 300) }.OutputImage; // To render the results, we need to create a context, and then // use one of the context rendering APIs, in this case, we render the // result into a CoreGraphics image, which is merely a useful representation // var context = CIContext.FromOptions (null); var cgimage = context.CreateCGImage (output, output.Extent); // The above cgimage can be added to a screen view, for example, this // would add it to a UIImageView on the screen: myImageView.Image = UIImage.FromImage (cgimage); ]]></code> </example> <para> With the following image input: </para> <para> <img href="~/CoreImage/_images/flower.png" alt="Photograph of a sunflower." /> </para> <para> Produces the following output: </para> <para> <img href="~/CoreImage/_images/sixfold_rotated_tile.png" alt="Result of applying the filter." /> </para> <para> "Flower" 2012 Milica Sekulic, used under a Creative Commons Attribution-ShareAlike license: path_to_url </para> </remarks> </Docs> </Documentation> ```
/content/code_sandbox/docs/api/CoreImage/CISixfoldRotatedTile.xml
xml
2016-04-20T18:24:26
2024-08-16T13:29:19
xamarin-macios
xamarin/xamarin-macios
2,436
474
```xml /* * This software is released under MIT license. * The full license information can be found in LICENSE in the root directory of this project. */ import { renderIcon } from '../icon.renderer.js'; import { IconShapeTuple } from '../interfaces/icon.interfaces.js'; const icon = { outline: '<circle cx="12" cy="24" r="1.5"/><circle cx="18" cy="24" r="1.5"/><circle cx="18" cy="18" r="1.5"/><circle cx="24" cy="12" r="1.5"/><circle cx="24" cy="24" r="1.5"/><circle cx="24" cy="18" r="1.5"/>', }; export const dragHandleCornerIconName = 'drag-handle-corner'; export const dragHandleCornerIcon: IconShapeTuple = [dragHandleCornerIconName, renderIcon(icon)]; ```
/content/code_sandbox/packages/core/src/icon/shapes/drag-handle-corner.ts
xml
2016-09-29T17:24:17
2024-08-11T17:06:15
clarity
vmware-archive/clarity
6,431
190
```xml import { AbortController } from "./AbortController"; import { HttpError, TimeoutError } from "./Errors"; import { HttpClient, HttpRequest } from "./HttpClient"; import { ILogger, LogLevel } from "./ILogger"; import { ITransport, TransferFormat } from "./ITransport"; import { Arg, getDataDetail, sendMessage } from "./Utils"; // Not exported from 'index', this type is internal. /** @private */ export class LongPollingTransport implements ITransport { private readonly httpClient: HttpClient; private readonly accessTokenFactory: (() => string | Promise<string>) | undefined; private readonly logger: ILogger; private readonly logMessageContent: boolean; private readonly pollAbort: AbortController; private url?: string; private running: boolean; private receiving?: Promise<void>; private closeError?: Error; public onreceive: ((data: string | ArrayBuffer) => void) | null; public onclose: ((error?: Error) => void) | null; // This is an internal type, not exported from 'index' so this is really just internal. public get pollAborted() { return this.pollAbort.aborted; } constructor(httpClient: HttpClient, accessTokenFactory: (() => string | Promise<string>) | undefined, logger: ILogger, logMessageContent: boolean) { this.httpClient = httpClient; this.accessTokenFactory = accessTokenFactory; this.logger = logger; this.pollAbort = new AbortController(); this.logMessageContent = logMessageContent; this.running = false; this.onreceive = null; this.onclose = null; } public async connect(url: string, transferFormat: TransferFormat): Promise<void> { Arg.isRequired(url, "url"); Arg.isRequired(transferFormat, "transferFormat"); Arg.isIn(transferFormat, TransferFormat, "transferFormat"); this.url = url; this.logger.log(LogLevel.Trace, "(LongPolling transport) Connecting."); // Allow binary format on Node and Browsers that support binary content (indicated by the presence of responseType property) if (transferFormat === TransferFormat.Binary && (typeof XMLHttpRequest !== "undefined" && typeof new XMLHttpRequest().responseType !== "string")) { throw new Error("Binary protocols over XmlHttpRequest not implementing advanced features are not supported."); } const pollOptions: HttpRequest = { abortSignal: this.pollAbort.signal, headers: {}, timeout: 100000, }; if (transferFormat === TransferFormat.Binary) { pollOptions.responseType = "arraybuffer"; } const token = await this.getAccessToken(); this.updateHeaderToken(pollOptions, token); // Make initial long polling request // Server uses first long polling request to finish initializing connection and it returns without data const pollUrl = `${url}&_=${Date.now()}`; this.logger.log(LogLevel.Trace, `(LongPolling transport) polling: ${pollUrl}.`); const response = await this.httpClient.get(pollUrl, pollOptions); if (response.statusCode !== 200) { this.logger.log(LogLevel.Error, `(LongPolling transport) Unexpected response code: ${response.statusCode}.`); // Mark running as false so that the poll immediately ends and runs the close logic this.closeError = new HttpError(response.statusText || "", response.statusCode); this.running = false; } else { this.running = true; } this.receiving = this.poll(this.url, pollOptions); } private async getAccessToken(): Promise<string | null> { if (this.accessTokenFactory) { return await this.accessTokenFactory(); } return null; } private updateHeaderToken(request: HttpRequest, token: string | null) { if (!request.headers) { request.headers = {}; } if (token) { // tslint:disable-next-line:no-string-literal request.headers["Authorization"] = `Bearer ${token}`; return; } // tslint:disable-next-line:no-string-literal if (request.headers["Authorization"]) { // tslint:disable-next-line:no-string-literal delete request.headers["Authorization"]; } } private async poll(url: string, pollOptions: HttpRequest): Promise<void> { try { while (this.running) { // We have to get the access token on each poll, in case it changes const token = await this.getAccessToken(); this.updateHeaderToken(pollOptions, token); try { const pollUrl = `${url}&_=${Date.now()}`; this.logger.log(LogLevel.Trace, `(LongPolling transport) polling: ${pollUrl}.`); const response = await this.httpClient.get(pollUrl, pollOptions); if (response.statusCode === 204) { this.logger.log(LogLevel.Information, "(LongPolling transport) Poll terminated by server."); this.running = false; } else if (response.statusCode !== 200) { this.logger.log(LogLevel.Error, `(LongPolling transport) Unexpected response code: ${response.statusCode}.`); // Unexpected status code this.closeError = new HttpError(response.statusText || "", response.statusCode); this.running = false; } else { // Process the response if (response.content) { this.logger.log(LogLevel.Trace, `(LongPolling transport) data received. ${getDataDetail(response.content, this.logMessageContent)}.`); if (this.onreceive) { this.onreceive(response.content); } } else { // This is another way timeout manifest. this.logger.log(LogLevel.Trace, "(LongPolling transport) Poll timed out, reissuing."); } } } catch (e) { if (!this.running) { // Log but disregard errors that occur after stopping this.logger.log(LogLevel.Trace, `(LongPolling transport) Poll errored after shutdown: ${e.message}`); } else { if (e instanceof TimeoutError) { // Ignore timeouts and reissue the poll. this.logger.log(LogLevel.Trace, "(LongPolling transport) Poll timed out, reissuing."); } else { // Close the connection with the error as the result. this.closeError = e; this.running = false; } } } } } finally { this.logger.log(LogLevel.Trace, "(LongPolling transport) Polling complete."); // We will reach here with pollAborted==false when the server returned a response causing the transport to stop. // If pollAborted==true then client initiated the stop and the stop method will raise the close event after DELETE is sent. if (!this.pollAborted) { this.raiseOnClose(); } } } public async send(data: any): Promise<void> { if (!this.running) { return Promise.reject(new Error("Cannot send until the transport is connected")); } return sendMessage(this.logger, "LongPolling", this.httpClient, this.url!, this.accessTokenFactory, data, this.logMessageContent); } public async stop(): Promise<void> { this.logger.log(LogLevel.Trace, "(LongPolling transport) Stopping polling."); // Tell receiving loop to stop, abort any current request, and then wait for it to finish this.running = false; this.pollAbort.abort(); try { await this.receiving; // Send DELETE to clean up long polling on the server this.logger.log(LogLevel.Trace, `(LongPolling transport) sending DELETE request to ${this.url}.`); const deleteOptions: HttpRequest = { headers: {}, }; const token = await this.getAccessToken(); this.updateHeaderToken(deleteOptions, token); await this.httpClient.delete(this.url!, deleteOptions); this.logger.log(LogLevel.Trace, "(LongPolling transport) DELETE request sent."); } finally { this.logger.log(LogLevel.Trace, "(LongPolling transport) Stop finished."); // Raise close event here instead of in polling // It needs to happen after the DELETE request is sent this.raiseOnClose(); } } private raiseOnClose() { if (this.onclose) { let logMessage = "(LongPolling transport) Firing onclose event."; if (this.closeError) { logMessage += " Error: " + this.closeError; } this.logger.log(LogLevel.Trace, logMessage); this.onclose(this.closeError); } } } ```
/content/code_sandbox/clients/ts/signalr/src/LongPollingTransport.ts
xml
2016-10-17T16:39:15
2024-08-15T16:33:14
SignalR
aspnet/SignalR
2,383
1,766
```xml /* * Squidex Headless CMS * * @license */ import { Component } from '@angular/core'; import { RouterLink, RouterLinkActive, RouterOutlet } from '@angular/router'; import { AppsState, ExternalLinkDirective, LayoutComponent, TitleComponent, TourStepDirective, TranslatePipe } from '@app/shared'; @Component({ standalone: true, selector: 'sqx-api-area', styleUrls: ['./api-area.component.scss'], templateUrl: './api-area.component.html', imports: [ ExternalLinkDirective, LayoutComponent, RouterLink, RouterLinkActive, RouterOutlet, TitleComponent, TourStepDirective, TranslatePipe, ], }) export class ApiAreaComponent { constructor( public readonly appsState: AppsState, ) { } } ```
/content/code_sandbox/frontend/src/app/features/api/api-area.component.ts
xml
2016-08-29T05:53:40
2024-08-16T17:39:38
squidex
Squidex/squidex
2,222
169
```xml import React from 'react'; import { render } from '../../test/test-react-testing-library'; import LinkExternal from './LinkExternal'; describe('<LinkExternal /> component', () => { test('should render the component in default state', () => { const { container } = render(<LinkExternal to={'/'} />); expect(container.firstChild).toMatchSnapshot(); }); test('should render the component with external link', () => { const { container } = render( <LinkExternal to={'path_to_url}>{'Example'}</LinkExternal> ); expect(container.firstChild).toMatchSnapshot(); }); }); ```
/content/code_sandbox/packages/ui-components/src/components/LinkExternal/LinkExternal.test.tsx
xml
2016-04-15T16:21:12
2024-08-16T09:38:01
verdaccio
verdaccio/verdaccio
16,189
126
```xml export const breakpointToNumber = (str: string): number => parseInt(str.substring(0, str.indexOf('px')), 10); ```
/content/code_sandbox/src/theme/helpers.ts
xml
2016-12-04T01:35:27
2024-08-14T21:41:58
MyCrypto
MyCryptoHQ/MyCrypto
1,347
29
```xml import { expect } from 'chai'; import { Model } from '../../../src/model/model/model'; describe('model', () => { describe('constructor', () => { it('should equal Model class', () => { expect(Model.prototype.constructor).to.equal(Model); }); }); }); ```
/content/code_sandbox/test/specs/models/model.spec.ts
xml
2016-01-27T11:25:52
2024-08-13T16:56:45
sequelize-typescript
sequelize/sequelize-typescript
2,768
61
```xml <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url"> <plist version="1.0"> <dict> <key>CFBundleIdentifier</key> <string>com.jazzy.katana</string> <key>CFBundleName</key> <string>Katana</string> <key>DocSetPlatformFamily</key> <string>katana</string> <key>isDashDocset</key> <true/> <key>dashIndexFilePath</key> <string>index.html</string> <key>isJavaScriptEnabled</key> <true/> <key>DashDocSetFamily</key> <string>dashtoc</string> </dict> </plist> ```
/content/code_sandbox/docs/latest/docsets/Katana.docset/Contents/Info.plist
xml
2016-08-09T08:09:22
2024-08-10T03:34:45
katana-swift
BendingSpoons/katana-swift
2,251
188
```xml /* Use of this source code is governed by an MIT-style license that can be found in the LICENSE file or at path_to_url */ import {logger} from 'workbox-core/_private/logger.js'; import { RouteHandlerCallback, RouteHandlerCallbackOptions, } from 'workbox-core/types.js'; import {createHeaders} from './utils/createHeaders.js'; import {concatenateToResponse} from './concatenateToResponse.js'; import {isSupported} from './isSupported.js'; import {StreamSource} from './_types.js'; import './_version.js'; export interface StreamsHandlerCallback { ({url, request, event, params}: RouteHandlerCallbackOptions): | Promise<StreamSource> | StreamSource; } /** * A shortcut to create a strategy that could be dropped-in to Workbox's router. * * On browsers that do not support constructing new `ReadableStream`s, this * strategy will automatically wait for all the `sourceFunctions` to complete, * and create a final response that concatenates their values together. * * @param {Array<function({event, request, url, params})>} sourceFunctions * An array of functions similar to {@link workbox-routing~handlerCallback} * but that instead return a {@link workbox-streams.StreamSource} (or a * Promise which resolves to one). * @param {HeadersInit} [headersInit] If there's no `Content-Type` specified, * `'text/html'` will be used by default. * @return {workbox-routing~handlerCallback} * @memberof workbox-streams */ function strategy( sourceFunctions: StreamsHandlerCallback[], headersInit: HeadersInit, ): RouteHandlerCallback { return async ({event, request, url, params}: RouteHandlerCallbackOptions) => { const sourcePromises = sourceFunctions.map((fn) => { // Ensure the return value of the function is always a promise. return Promise.resolve(fn({event, request, url, params})); }); if (isSupported()) { const {done, response} = concatenateToResponse( sourcePromises, headersInit, ); if (event) { event.waitUntil(done); } return response; } if (process.env.NODE_ENV !== 'production') { logger.log( `The current browser doesn't support creating response ` + `streams. Falling back to non-streaming response instead.`, ); } // Fallback to waiting for everything to finish, and concatenating the // responses. const blobPartsPromises = sourcePromises.map(async (sourcePromise) => { const source = await sourcePromise; if (source instanceof Response) { return source.blob(); } else { // Technically, a `StreamSource` object can include any valid // `BodyInit` type, including `FormData` and `URLSearchParams`, which // cannot be passed to the Blob constructor directly, so we have to // convert them to actual Blobs first. return new Response(source).blob(); } }); const blobParts = await Promise.all(blobPartsPromises); const headers = createHeaders(headersInit); // Constructing a new Response from a Blob source is well-supported. // So is constructing a new Blob from multiple source Blobs or strings. return new Response(new Blob(blobParts), {headers}); }; } export {strategy}; ```
/content/code_sandbox/packages/workbox-streams/src/strategy.ts
xml
2016-04-04T15:55:19
2024-08-16T08:33:26
workbox
GoogleChrome/workbox
12,245
728
```xml import { LangCz } from "./lang-cz.js"; import { LangEn } from "./lang-en.js"; import { LangEs } from "./lang-es.js"; import { LangFr } from "./lang-fr.js"; import { LangJa } from "./lang-ja.js"; import { LangKo } from "./lang-ko.js"; import { LangIt } from "./lang-it.js"; import { LangPt } from "./lang-pt.js"; import { LangZh } from "./lang-zh.js"; import type { Wordlist } from "./wordlist.js"; /** * The available Wordlists by their * [ISO 639-1 Language Code](link-wiki-iso639). * * (**i.e.** [cz](LangCz), [en](LangEn), [es](LangEs), [fr](LangFr), * [ja](LangJa), [ko](LangKo), [it](LangIt), [pt](LangPt), * [zh_cn](LangZh), [zh_tw](LangZh)) * * The dist files (in the ``/dist`` folder) have had all languages * except English stripped out, which reduces the library size by * about 80kb. If required, they are available by importing the * included ``wordlists-extra.min.js`` file. */ export const wordlists: Record<string, Wordlist> = { cz: LangCz.wordlist(), en: LangEn.wordlist(), es: LangEs.wordlist(), fr: LangFr.wordlist(), it: LangIt.wordlist(), pt: LangPt.wordlist(), ja: LangJa.wordlist(), ko: LangKo.wordlist(), zh_cn: LangZh.wordlist("cn"), zh_tw: LangZh.wordlist("tw"), }; ```
/content/code_sandbox/src.ts/wordlists/wordlists.ts
xml
2016-07-16T04:35:37
2024-08-16T13:37:46
ethers.js
ethers-io/ethers.js
7,843
389
```xml import { Entity } from "../../../../../src/decorator/entity/Entity" import { Column } from "../../../../../src/decorator/columns/Column" import { PrimaryGeneratedColumn } from "../../../../../src/decorator/columns/PrimaryGeneratedColumn" @Entity({ database: "secondDB", schema: "answers" }) export class Answer { @PrimaryGeneratedColumn() id: number @Column() text: string @Column() questionId: number } ```
/content/code_sandbox/test/functional/multi-schema-and-database/multi-schema-and-database-basic-functionality/entity/Answer.ts
xml
2016-02-29T07:41:14
2024-08-16T18:28:52
typeorm
typeorm/typeorm
33,875
101
```xml import { saveRecording } from "backend/sessionRecording/saveRecording"; import { compressEvents, getSessionEventsToSave } from "../../../utils/sessionEvents"; import { getRecordingOptionsToSave } from "features/sessionBook/utils/sessionFile"; import { toast } from "utils/Toast"; import { trackDraftSessionSaveFailed, trackDraftSessionSaved } from "features/sessionBook/analytics"; import { SessionRecordingMetadata, SessionSaveMode } from "../../../types"; import { IncentivizeEvent, UserIncentiveEvent } from "features/incentivization/types"; import { Dispatch } from "@reduxjs/toolkit"; import { incentivizationActions } from "store/features/incentivization/slice"; import { IncentivizationModal } from "store/features/incentivization/types"; import PATHS from "config/constants/sub/paths"; import { CONSTANTS as GLOBAL_CONSTANTS } from "@requestly/requestly-core"; import { NavigateFunction } from "react-router-dom"; import { CheckboxValueType } from "antd/lib/checkbox/Group"; export const generateDraftSessionTitle = (url: string) => { const hostname = new URL(url).hostname.split(".").slice(0, -1).join("."); const date = new Date(); const month = date.toLocaleString("default", { month: "short" }); const formattedDate = `${date.getDate()}${month}${date.getFullYear()}`; return `${hostname}@${formattedDate}`; }; export const saveDraftSession = async ( user: any, userAttributes: any, appMode: string, dispatch: Dispatch, navigate: NavigateFunction, workspaceId: string, sessionRecordingMetadata: SessionRecordingMetadata, sessionEvents: any, recordingOptions: CheckboxValueType[], source: string, claimIncentiveRewards: (event: UserIncentiveEvent) => Promise<unknown>, isOpenedInIframe?: boolean ) => { const isDraftSession = window.location.pathname.includes("draft") || appMode === GLOBAL_CONSTANTS.APP_MODES.DESKTOP; const recordingOptionsToSave = getRecordingOptionsToSave(recordingOptions); if (isOpenedInIframe) { window.parent.postMessage({ action: "draftSessionSaveClicked", source: "requestly:client" }, "*"); } return saveRecording( user?.details?.profile?.uid, workspaceId, sessionRecordingMetadata, compressEvents(getSessionEventsToSave(sessionEvents, recordingOptionsToSave)), recordingOptionsToSave, source, null ).then((response) => { if (response?.success) { toast.success("Recording saved successfully"); trackDraftSessionSaved({ session_length: sessionRecordingMetadata?.sessionAttributes?.duration, options: recordingOptionsToSave, type: SessionSaveMode.ONLINE, source, recording_mode: sessionRecordingMetadata?.recordingMode, }); if (isDraftSession) { claimIncentiveRewards({ type: IncentivizeEvent.SESSION_RECORDED, metadata: { num_sessions: userAttributes?.num_sessions || 1 }, })?.then((response: any) => { if (response.data?.success) { dispatch( incentivizationActions.setUserMilestoneAndRewardDetails({ userMilestoneAndRewardDetails: response.data?.data, }) ); dispatch( incentivizationActions.toggleActiveModal({ modalName: IncentivizationModal.TASK_COMPLETED_MODAL, newValue: true, newProps: { event: IncentivizeEvent.SESSION_RECORDED }, }) ); } }); } if (isOpenedInIframe) { window.parent.postMessage( { action: "draftSessionSaved", source: "requestly:client", payload: { sessionId: response?.firestoreId } }, "*" ); } else { let path = "/" + PATHS.SESSIONS.RELATIVE + "/saved/" + response?.firestoreId; if (appMode === GLOBAL_CONSTANTS.APP_MODES.DESKTOP) path = PATHS.SESSIONS.DESKTOP.SAVED_WEB_SESSION_VIEWER.ABSOLUTE + `/${response?.firestoreId}`; navigate(path, { state: { fromApp: true, viewAfterSave: true }, }); } } else { toast.error(response?.message); trackDraftSessionSaveFailed(response?.message); } }); }; ```
/content/code_sandbox/app/src/features/sessionBook/screens/DraftSessionScreen/utils/index.ts
xml
2016-12-01T04:36:06
2024-08-16T19:12:19
requestly
requestly/requestly
2,121
936
```xml <TS language="gl" version="2.1"> <context> <name>AddressBookPage</name> <message> <source>Create a new address</source> <translation>Crear unha nova direccin</translation> </message> <message> <source>&amp;New</source> <translation>&amp;Novo</translation> </message> <message> <source>Copy the currently selected address to the system clipboard</source> <translation>Copiar a direccin seleccionada ao cartafol</translation> </message> <message> <source>&amp;Copy</source> <translation>&amp;Copiar</translation> </message> <message> <source>C&amp;lose</source> <translation>&amp;Pechar</translation> </message> <message> <source>Delete the currently selected address from the list</source> <translation>Borrar a direccin actualmente seleccionada da listaxe</translation> </message> <message> <source>Export the data in the current tab to a file</source> <translation>Exportar os datos da pestaa actual a un arquivo.</translation> </message> <message> <source>&amp;Export</source> <translation>&amp;Exportar</translation> </message> <message> <source>&amp;Delete</source> <translation>&amp;Borrar</translation> </message> </context> <context> <name>AddressTableModel</name> </context> <context> <name>AskPasswordDialog</name> <message> <source>Password Dialog</source> <translation>Dilogo de Contrasinal</translation> </message> <message> <source>Enter password</source> <translation>Introduce contrasinal</translation> </message> <message> <source>New password</source> <translation>Novo contrasinal</translation> </message> <message> <source>Repeat new password</source> <translation>Repite novo contrasinal</translation> </message> </context> <context> <name>BanTableModel</name> </context> <context> <name>VERGEGUI</name> <message> <source>Sign &amp;message...</source> <translation>&amp;Asinar mensaxe...</translation> </message> <message> <source>Synchronizing with network...</source> <translation>Sincronizando coa rede...</translation> </message> <message> <source>&amp;Overview</source> <translation>&amp;Vista xeral</translation> </message> <message> <source>Show general overview of wallet</source> <translation>Amosar vista xeral do moedeiro</translation> </message> <message> <source>&amp;Transactions</source> <translation>&amp;Transacciones</translation> </message> <message> <source>Browse transaction history</source> <translation>Navegar historial de transaccins</translation> </message> <message> <source>E&amp;xit</source> <translation>&amp;Sar</translation> </message> <message> <source>Quit application</source> <translation>Sar da aplicacin</translation> </message> <message> <source>About &amp;Qt</source> <translation>Acerca de &amp;Qt</translation> </message> <message> <source>Show information about Qt</source> <translation>Amosar informacin acerca de Qt</translation> </message> <message> <source>&amp;Options...</source> <translation>&amp;Opcins...</translation> </message> <message> <source>&amp;Encrypt Wallet...</source> <translation>&amp;Encriptar Moedeiro...</translation> </message> <message> <source>&amp;Backup Wallet...</source> <translation>Copia de &amp;Seguridade do Moedeiro...</translation> </message> <message> <source>&amp;Change Password...</source> <translation>&amp;Cambiar contrasinal...</translation> </message> <message> <source>&amp;Receiving addresses...</source> <translation>Direccins para recibir</translation> </message> <message> <source>Reindexing blocks on disk...</source> <translation>Reindexando bloques no disco...</translation> </message> <message> <source>Send coins to a VERGE address</source> <translation>Enviar moedas a unha direccin VERGE</translation> </message> <message> <source>Backup wallet to another location</source> <translation>Facer copia de seguridade do moedeiro noutra localizacin</translation> </message> <message> <source>Change the password used for wallet encryption</source> <translation>Cambiar o contrasinal empregado para a encriptacin do moedeiro</translation> </message> <message> <source>&amp;Debug window</source> <translation>Ventana de &amp;Depuracin</translation> </message> <message> <source>Open debugging and diagnostic console</source> <translation>Abrir consola de depuracin e diagnstico</translation> </message> <message> <source>&amp;Verify message...</source> <translation>&amp;Verificar mensaxe...</translation> </message> <message> <source>VERGE</source> <translation>VERGE</translation> </message> <message> <source>Wallet</source> <translation>Moedeiro</translation> </message> <message> <source>&amp;Send</source> <translation>&amp;Enviar</translation> </message> <message> <source>&amp;Receive</source> <translation>&amp;Recibir</translation> </message> <message> <source>&amp;Show / Hide</source> <translation>&amp;Amosar/Agachar</translation> </message> <message> <source>Show or hide the main Window</source> <translation>Amosar ou agachar a ventana principal</translation> </message> <message> <source>Encrypt the private keys that belong to your wallet</source> <translation>Encriptar as claves privadas que pertencen ao teu moedeiro</translation> </message> <message> <source>Sign messages with your VERGE addresses to prove you own them</source> <translation>Asina mensaxes coas tas direccins VERGE para probar que te pertencen</translation> </message> <message> <source>Verify messages to ensure they were signed with specified VERGE addresses</source> <translation>Verificar mensaxes para asegurar que foron asinados con direccins VERGE dadas.</translation> </message> <message> <source>&amp;File</source> <translation>&amp;Arquivo</translation> </message> <message> <source>&amp;Settings</source> <translation>Axus&amp;tes</translation> </message> <message> <source>&amp;Help</source> <translation>A&amp;xuda</translation> </message> <message> <source>Tabs toolbar</source> <translation>Barra de ferramentas</translation> </message> <message> <source>Request payments (generates QR codes and verge: URIs)</source> <translation>Solicitar pagos (xenera cdigos QR e verge: URIs)</translation> </message> <message> <source>Show the list of used sending addresses and labels</source> <translation>Amosar a listaxe de direccins e etiquetas para enviar empregadas</translation> </message> <message> <source>Show the list of used receiving addresses and labels</source> <translation>Amosar a listaxe de etiquetas e direccins para recibir empregadas</translation> </message> <message> <source>Open a verge: URI or payment request</source> <translation>Abrir un verge: URI ou solicitude de pago</translation> </message> <message> <source>&amp;Command-line options</source> <translation>Opcins da lia de comandos</translation> </message> <message> <source>%1 behind</source> <translation>%1 detrs</translation> </message> <message> <source>Last received block was generated %1 ago.</source> <translation>O ltimo bloque recibido foi xerado fai %1.</translation> </message> <message> <source>Transactions after this will not yet be visible.</source> <translation>As transaccins despois desta non sern todava visibles.</translation> </message> <message> <source>Error</source> <translation>Erro</translation> </message> <message> <source>Warning</source> <translation>Precaucin</translation> </message> <message> <source>Information</source> <translation>Informacin</translation> </message> <message> <source>Up to date</source> <translation>Actualizado</translation> </message> <message> <source>Catching up...</source> <translation>Poendo ao da...</translation> </message> <message> <source>Sent transaction</source> <translation>Transaccin enviada</translation> </message> <message> <source>Incoming transaction</source> <translation>Transaccin entrante</translation> </message> <message> <source>Wallet is &lt;b&gt;encrypted&lt;/b&gt; and currently &lt;b&gt;unlocked&lt;/b&gt;</source> <translation>O moedeiro est &lt;b&gt;encriptado&lt;/b&gt; e actualmente &lt;b&gt;desbloqueado&lt;/b&gt;</translation> </message> <message> <source>Wallet is &lt;b&gt;encrypted&lt;/b&gt; and currently &lt;b&gt;locked&lt;/b&gt;</source> <translation>O moedeiro est &lt;b&gt;encriptado&lt;/b&gt; e actualmente &lt;b&gt;bloqueado&lt;/b&gt;</translation> </message> </context> <context> <name>CoinControlDialog</name> <message> <source>Quantity:</source> <translation>Cantidade:</translation> </message> <message> <source>Bytes:</source> <translation>Bytes:</translation> </message> <message> <source>Amount:</source> <translation>Importe:</translation> </message> <message> <source>Fee:</source> <translation>Pago:</translation> </message> <message> <source>Change:</source> <translation>Cambiar:</translation> </message> <message> <source>(un)select all</source> <translation>(des)selecciona todo</translation> </message> <message> <source>Tree mode</source> <translation>Modo rbore</translation> </message> <message> <source>List mode</source> <translation>Modo lista</translation> </message> <message> <source>Amount</source> <translation>Cantidade</translation> </message> <message> <source>Date</source> <translation>Data</translation> </message> <message> <source>Confirmations</source> <translation>Confirmacins</translation> </message> <message> <source>Confirmed</source> <translation>Confirmado</translation> </message> </context> <context> <name>EditAddressDialog</name> <message> <source>Edit Address</source> <translation>Modificar Direccin</translation> </message> <message> <source>&amp;Label</source> <translation>&amp;Etiqueta</translation> </message> <message> <source>The label associated with this address list entry</source> <translation>A etiqueta asociada con esta entrada da listaxe de direccins</translation> </message> <message> <source>The address associated with this address list entry. This can only be modified for sending addresses.</source> <translation>A direccin asociada con esta entrada na listaxe de direccin. Esta so pode ser modificada por direccins para enviar.</translation> </message> <message> <source>&amp;Address</source> <translation>&amp;Direccin</translation> </message> </context> <context> <name>FreespaceChecker</name> <message> <source>A new data directory will be created.</source> <translation>Crearse un novo directorio de datos.</translation> </message> <message> <source>name</source> <translation>nome</translation> </message> <message> <source>Directory already exists. Add %1 if you intend to create a new directory here.</source> <translation>O directorio xa existe. Engade %1 se queres crear un novo directorio aqu.</translation> </message> <message> <source>Path already exists, and is not a directory.</source> <translation>A ruta xa existe e non un directorio.</translation> </message> <message> <source>Cannot create data directory here.</source> <translation>Non se pode crear directorio de datos aqu</translation> </message> </context> <context> <name>HelpMessageDialog</name> <message> <source>version</source> <translation>versin</translation> </message> <message> <source>Command-line options</source> <translation>Opcins da lia de comandos</translation> </message> <message> <source>Usage:</source> <translation>Emprego:</translation> </message> <message> <source>command-line options</source> <translation>opcins da lia de comandos</translation> </message> </context> <context> <name>Intro</name> <message> <source>Welcome</source> <translation>Benvido</translation> </message> <message> <source>Use the default data directory</source> <translation>Empregar o directorio de datos por defecto</translation> </message> <message> <source>Use a custom data directory:</source> <translation>Empregar un directorio de datos personalizado</translation> </message> <message> <source>VERGE</source> <translation>VERGE</translation> </message> <message> <source>Error</source> <translation>Erro</translation> </message> </context> <context> <name>ModalOverlay</name> <message> <source>Form</source> <translation>Formulario</translation> </message> <message> <source>Last block time</source> <translation>Hora do ltimo bloque</translation> </message> </context> <context> <name>OpenURIDialog</name> <message> <source>Open URI</source> <translation>Abrir URI</translation> </message> <message> <source>Open payment request from URI or file</source> <translation>Abrir solicitude de pago dende URI ou ficheiro</translation> </message> <message> <source>URI:</source> <translation>URI:</translation> </message> <message> <source>Select payment request file</source> <translation>Seleccionar ficheiro de solicitude de pago</translation> </message> </context> <context> <name>OptionsDialog</name> <message> <source>Options</source> <translation>Opcins</translation> </message> <message> <source>&amp;Main</source> <translation>&amp;Principal</translation> </message> <message> <source>Reset all client options to default.</source> <translation>Restaurar todas as opcins de cliente s por defecto</translation> </message> <message> <source>&amp;Reset Options</source> <translation>Opcins de &amp;Restaurar</translation> </message> <message> <source>&amp;Network</source> <translation>&amp;Rede</translation> </message> <message> <source>W&amp;allet</source> <translation>Moedeiro</translation> </message> <message> <source>Automatically open the VERGE client port on the router. This only works when your router supports UPnP and it is enabled.</source> <translation>Abrir automticamente o porto do cliente VERGE no router. Esto so funciona se o teu router soporta UPnP e est habilitado.</translation> </message> <message> <source>Map port using &amp;UPnP</source> <translation>Mapear porto empregando &amp;UPnP</translation> </message> <message> <source>Proxy &amp;IP:</source> <translation>&amp;IP do Proxy:</translation> </message> <message> <source>&amp;Port:</source> <translation>&amp;Porto:</translation> </message> <message> <source>Port of the proxy (e.g. 9050)</source> <translation>Porto do proxy (exemplo: 9050)</translation> </message> <message> <source>&amp;Window</source> <translation>&amp;Xanela</translation> </message> <message> <source>Show only a tray icon after minimizing the window.</source> <translation>Amosar so un icono na bandexa tras minimiza-la xanela.</translation> </message> <message> <source>&amp;Minimize to the tray instead of the taskbar</source> <translation>&amp;Minimizar bandexa en lugar de barra de tarefas.</translation> </message> <message> <source>M&amp;inimize on close</source> <translation>M&amp;inimizar ao pechar</translation> </message> <message> <source>&amp;Display</source> <translation>&amp;Visualizacin</translation> </message> <message> <source>User Interface &amp;language:</source> <translation>&amp;Linguaxe de interface de usuario:</translation> </message> <message> <source>&amp;Unit to show amounts in:</source> <translation>&amp;Unidade na que amosar as cantidades:</translation> </message> <message> <source>Choose the default subdivision unit to show in the interface and when sending coins.</source> <translation>Escolle a unidade de subdivisin por defecto para amosar na interface e ao enviar moedas.</translation> </message> <message> <source>&amp;OK</source> <translation>&amp;OK</translation> </message> <message> <source>&amp;Cancel</source> <translation>&amp;Cancelar</translation> </message> <message> <source>default</source> <translation>por defecto</translation> </message> <message> <source>Confirm options reset</source> <translation>Confirmar opcins de restaurar</translation> </message> <message> <source>Error</source> <translation>Erro</translation> </message> <message> <source>The supplied proxy address is invalid.</source> <translation>A direccin de proxy suministrada invlida.</translation> </message> </context> <context> <name>OverviewPage</name> <message> <source>Form</source> <translation>Formulario</translation> </message> <message> <source>The displayed information may be out of date. Your wallet automatically synchronizes with the VERGE network after a connection is established, but this process has not completed yet.</source> <translation>A informacin amosada por estar desactualizada. O teu moedeiro sincronzase automticamente coa rede VERGE despois de que se estableza unha conexin, pero este proceso non est todava rematado.</translation> </message> <message> <source>Your current spendable balance</source> <translation>O teu balance actualmente dispoible</translation> </message> <message> <source>Total of transactions that have yet to be confirmed, and do not yet count toward the spendable balance</source> <translation>Total de transaccins que anda teen que ser confirmadas, e non contan todava dentro do balance gastable</translation> </message> <message> <source>Immature:</source> <translation>Inmaduro:</translation> </message> <message> <source>Mined balance that has not yet matured</source> <translation>O balance minado todava non madurou</translation> </message> <message> <source>Total:</source> <translation>Total:</translation> </message> <message> <source>Your current total balance</source> <translation>O teu balance actual total</translation> </message> </context> <context> <name>PaymentServer</name> </context> <context> <name>PeerTableModel</name> </context> <context> <name>QObject</name> <message> <source>Amount</source> <translation>Cantidade</translation> </message> <message> <source>%1 h</source> <translation>%1 h</translation> </message> <message> <source>%1 m</source> <translation>%1 m</translation> </message> <message> <source>N/A</source> <translation>N/A</translation> </message> <message> <source>%1 B</source> <translation>%1 B</translation> </message> <message> <source>%1 KB</source> <translation>%1 KB</translation> </message> <message> <source>%1 MB</source> <translation>%1 MB</translation> </message> <message> <source>%1 GB</source> <translation>%1 GB</translation> </message> <message> <source>unknown</source> <translation>descoecido</translation> </message> </context> <context> <name>QObject::QObject</name> </context> <context> <name>QRImageWidget</name> </context> <context> <name>RPCConsole</name> <message> <source>N/A</source> <translation>N/A</translation> </message> <message> <source>Client version</source> <translation>Versin do cliente</translation> </message> <message> <source>&amp;Information</source> <translation>&amp;Informacin</translation> </message> <message> <source>Debug window</source> <translation>Ventana de Depuracin</translation> </message> <message> <source>Startup time</source> <translation>Tempo de arranque</translation> </message> <message> <source>Network</source> <translation>Rede</translation> </message> <message> <source>Number of connections</source> <translation>Nmero de conexins</translation> </message> <message> <source>Block chain</source> <translation>Cadea de bloques</translation> </message> <message> <source>Current number of blocks</source> <translation>Nmero actual de bloques</translation> </message> <message> <source>Last block time</source> <translation>Hora do ltimo bloque</translation> </message> <message> <source>&amp;Open</source> <translation>&amp;Abrir</translation> </message> <message> <source>&amp;Console</source> <translation>&amp;Consola</translation> </message> <message> <source>&amp;Network Traffic</source> <translation>&amp;Trfico de Rede</translation> </message> <message> <source>Totals</source> <translation>Totais</translation> </message> <message> <source>In:</source> <translation>Dentro:</translation> </message> <message> <source>Out:</source> <translation>Fra:</translation> </message> <message> <source>Debug log file</source> <translation>Arquivo de log de depuracin</translation> </message> <message> <source>Clear console</source> <translation>Limpar consola</translation> </message> </context> <context> <name>ReceiveCoinsDialog</name> <message> <source>&amp;Amount:</source> <translation>&amp;Cantidade:</translation> </message> <message> <source>&amp;Label:</source> <translation>&amp;Etiqueta:</translation> </message> <message> <source>&amp;Message:</source> <translation>&amp;Mensaxe:</translation> </message> <message> <source>Clear all fields of the form.</source> <translation>Limpar tdolos campos do formulario</translation> </message> <message> <source>Clear</source> <translation>Limpar</translation> </message> <message> <source>&amp;Request payment</source> <translation>&amp;Solicitar pago</translation> </message> </context> <context> <name>ReceiveRequestDialog</name> <message> <source>QR Code</source> <translation>Cdigo QR</translation> </message> <message> <source>Copy &amp;URI</source> <translation>Copiar &amp;URI</translation> </message> <message> <source>Copy &amp;Address</source> <translation>Copiar &amp;Direccin</translation> </message> <message> <source>&amp;Save Image...</source> <translation>&amp;Gardar Imaxe...</translation> </message> </context> <context> <name>RecentRequestsTableModel</name> </context> <context> <name>SendCoinsDialog</name> <message> <source>Send Coins</source> <translation>Moedas Enviadas</translation> </message> <message> <source>Insufficient funds!</source> <translation>Fondos insuficientes</translation> </message> <message> <source>Quantity:</source> <translation>Cantidade:</translation> </message> <message> <source>Bytes:</source> <translation>Bytes:</translation> </message> <message> <source>Amount:</source> <translation>Importe:</translation> </message> <message> <source>Fee:</source> <translation>Pago:</translation> </message> <message> <source>Change:</source> <translation>Cambiar:</translation> </message> <message> <source>Transaction Fee:</source> <translation>Tarifa de transaccin:</translation> </message> <message> <source>Send to multiple recipients at once</source> <translation>Enviar a mltiples receptores vez</translation> </message> <message> <source>Add &amp;Recipient</source> <translation>Engadir &amp;Receptor</translation> </message> <message> <source>Clear all fields of the form.</source> <translation>Limpar tdolos campos do formulario</translation> </message> <message> <source>Clear &amp;All</source> <translation>Limpar &amp;Todo</translation> </message> <message> <source>Balance:</source> <translation>Balance:</translation> </message> <message> <source>Confirm the send action</source> <translation>Confirmar a accin de envo</translation> </message> <message> <source>S&amp;end</source> <translation>&amp;Enviar</translation> </message> </context> <context> <name>SendCoinsEntry</name> <message> <source>A&amp;mount:</source> <translation>&amp;Cantidade:</translation> </message> <message> <source>Pay &amp;To:</source> <translation>Pagar &amp;A:</translation> </message> <message> <source>&amp;Label:</source> <translation>&amp;Etiqueta:</translation> </message> <message> <source>Choose previously used address</source> <translation>Escoller direccin previamente empregada</translation> </message> <message> <source>This is a normal payment.</source> <translation>Este un pago normal</translation> </message> <message> <source>Alt+A</source> <translation>Alt+A</translation> </message> <message> <source>Paste address from clipboard</source> <translation>Pegar direccin dende portapapeis</translation> </message> <message> <source>Alt+P</source> <translation>Alt+P</translation> </message> <message> <source>Remove this entry</source> <translation>Eliminar esta entrada</translation> </message> <message> <source>Message:</source> <translation>Mensaxe:</translation> </message> <message> <source>Enter a label for this address to add it to the list of used addresses</source> <translation>Introduce unha etiqueta para esta direccin para engadila listaxe de direccins empregadas</translation> </message> <message> <source>Pay To:</source> <translation>Pagar A:</translation> </message> <message> <source>Memo:</source> <translation>Memo:</translation> </message> </context> <context> <name>SendConfirmationDialog</name> </context> <context> <name>ShutdownWindow</name> </context> <context> <name>SignVerifyMessageDialog</name> <message> <source>Signatures - Sign / Verify a Message</source> <translation>Sinaturas - Asinar / Verificar unha Mensaxe</translation> </message> <message> <source>&amp;Sign Message</source> <translation>&amp;Asinar Mensaxe</translation> </message> <message> <source>Choose previously used address</source> <translation>Escoller direccin previamente empregada</translation> </message> <message> <source>Alt+A</source> <translation>Alt+A</translation> </message> <message> <source>Paste address from clipboard</source> <translation>Pegar direccin dende portapapeis</translation> </message> <message> <source>Alt+P</source> <translation>Alt+P</translation> </message> <message> <source>Enter the message you want to sign here</source> <translation>Introduce a mensaxe que queres asinar aqu</translation> </message> <message> <source>Signature</source> <translation>Sinatura</translation> </message> <message> <source>Copy the current signature to the system clipboard</source> <translation>Copiar a sinatura actual ao portapapeis do sistema</translation> </message> <message> <source>Sign the message to prove you own this VERGE address</source> <translation>Asina a mensaxe para probar que posees esta direccin VERGE</translation> </message> <message> <source>Sign &amp;Message</source> <translation>Asinar &amp;Mensaxe</translation> </message> <message> <source>Reset all sign message fields</source> <translation>Restaurar todos os campos de sinatura de mensaxe</translation> </message> <message> <source>Clear &amp;All</source> <translation>Limpar &amp;Todo</translation> </message> <message> <source>&amp;Verify Message</source> <translation>&amp;Verificar Mensaxe</translation> </message> <message> <source>Verify the message to ensure it was signed with the specified VERGE address</source> <translation>Verificar a mensaxe para asegurar que foi asinada coa direccin VERGE especificada</translation> </message> <message> <source>Verify &amp;Message</source> <translation>Verificar &amp;Mensaxe</translation> </message> <message> <source>Reset all verify message fields</source> <translation>Restaurar todos os campos de verificacin de mensaxe</translation> </message> </context> <context> <name>SplashScreen</name> <message> <source>[testnet]</source> <translation>[testnet]</translation> </message> </context> <context> <name>TrafficGraphWidget</name> <message> <source>KB/s</source> <translation>KB/s</translation> </message> </context> <context> <name>TransactionDesc</name> </context> <context> <name>TransactionDescDialog</name> <message> <source>This pane shows a detailed description of the transaction</source> <translation>Este panel amosa unha descripcin detallada da transaccin</translation> </message> </context> <context> <name>TransactionTableModel</name> </context> <context> <name>TransactionView</name> </context> <context> <name>UnitDisplayStatusBarControl</name> </context> <context> <name>WalletFrame</name> </context> <context> <name>WalletModel</name> </context> <context> <name>WalletView</name> </context> <context> <name>verge-core</name> <message> <source>Options:</source> <translation>Opcins:</translation> </message> <message> <source>Specify data directory</source> <translation>Especificar directorio de datos</translation> </message> <message> <source>Connect to a node to retrieve peer addresses, and disconnect</source> <translation>Conectar a nodo para recuperar direccins de pares, e desconectar</translation> </message> <message> <source>Specify your own public address</source> <translation>Especificar a ta propia direccin pblica</translation> </message> <message> <source>Accept command line and JSON-RPC commands</source> <translation>Aceptar lia de comandos e comandos JSON-RPC</translation> </message> <message> <source>Run in the background as a daemon and accept commands</source> <translation>Executar no fondo como un demo e aceptar comandos</translation> </message> <message> <source>VERGE Core</source> <translation>Core de VERGE</translation> </message> <message> <source>Bind to given address and always listen on it. Use [host]:port notation for IPv6</source> <translation>Enlazar a unha direccin dada e escoitar sempre nela. Emprega a notacin [host]:post para IPv6</translation> </message> <message> <source>Execute command when a wallet transaction changes (%s in cmd is replaced by TxID)</source> <translation>Executar comando cando unha transaccin do moedeiro cambia (%s no comando substitudo por TxID)</translation> </message> <message> <source>&lt;category&gt; can be:</source> <translation>&lt;categora&gt; pode ser:</translation> </message> <message> <source>Accept connections from outside (default: 1 if no -proxy or -connect)</source> <translation>Aceptar conexins de fra (por defecto: 1 se non -proxy ou -connect)</translation> </message> <message> <source>Block creation options:</source> <translation>Opcins de creacin de bloque:</translation> </message> <message> <source>Corrupted block database detected</source> <translation>Detectada base de datos de bloques corrupta.</translation> </message> <message> <source>Do you want to rebuild the block database now?</source> <translation>Queres reconstrur a base de datos de bloques agora?</translation> </message> <message> <source>Error initializing block database</source> <translation>Erro inicializando a base de datos de bloques</translation> </message> <message> <source>Error initializing wallet database environment %s!</source> <translation>Erro inicializando entorno de base de datos de moedeiro %s!</translation> </message> <message> <source>Error loading block database</source> <translation>Erro cargando base de datos do bloque</translation> </message> <message> <source>Error opening block database</source> <translation>Erro abrindo base de datos de bloques</translation> </message> <message> <source>Error: Disk space is low!</source> <translation>Erro: Espacio en disco escaso!</translation> </message> <message> <source>Failed to listen on any port. Use -listen=0 if you want this.</source> <translation>Fallou escoitar en calquera porto. Emprega -listen=0 se queres esto.</translation> </message> <message> <source>Incorrect or no genesis block found. Wrong datadir for network?</source> <translation>Bloque genesis incorrecto o no existente. Datadir errneo para a rede?</translation> </message> <message> <source>Not enough file descriptors available.</source> <translation>Non hai suficientes descritores de arquivo dispoibles.</translation> </message> <message> <source>Specify wallet file (within data directory)</source> <translation>Especificar arquivo do moedeiro (dentro do directorio de datos)</translation> </message> <message> <source>Verifying blocks...</source> <translation>Verificando bloques...</translation> </message> <message> <source>Execute command when a relevant alert is received or we see a really long fork (%s in cmd is replaced by message)</source> <translation>Executar comando cando se recibe unha alerta relevante ou vemos un fork realmente longo (%s no cmd substitudo pola mensaxe)</translation> </message> <message> <source>Information</source> <translation>Informacin</translation> </message> <message> <source>Send trace/debug info to console instead of debug.log file</source> <translation>Enviar traza/informacin de depuracin consola en lugar de ao arquivo debug.log</translation> </message> <message> <source>Shrink debug.log file on client startup (default: 1 when no -debug)</source> <translation>Recortar o arquivo debug.log ao arrancar o cliente (por defecto: 1 cando no-debug)</translation> </message> <message> <source>Signing transaction failed</source> <translation>Fallou a sinatura da transaccin</translation> </message> <message> <source>Transaction amount too small</source> <translation>A cantidade da transaccin demasiado pequena</translation> </message> <message> <source>Transaction too large</source> <translation>A transaccin demasiado grande</translation> </message> <message> <source>Username for JSON-RPC connections</source> <translation>Nome de usuario para conexins JSON-RPC</translation> </message> <message> <source>Warning</source> <translation>Precaucin</translation> </message> <message> <source>You need to rebuild the database using -reindex to change -txindex</source> <translation>Precisas reconstrur a base de datos empregando -reindex para cambiar -txindex</translation> </message> <message> <source>Password for JSON-RPC connections</source> <translation>Contrasinal para conexins JSON-RPC</translation> </message> <message> <source>Execute command when the best block changes (%s in cmd is replaced by block hash)</source> <translation>Executar comando cando o mellor bloque cambie (%s no comando sustitudo polo hash do bloque)</translation> </message> <message> <source>Allow DNS lookups for -addnode, -seednode and -connect</source> <translation>Permitir lookup de DNS para -addnote, -seednote e -connect</translation> </message> <message> <source>Unknown network specified in -onlynet: '%s'</source> <translation>Rede descoecida especificada en -onlynet: '%s'</translation> </message> <message> <source>Insufficient funds</source> <translation>Fondos insuficientes</translation> </message> <message> <source>Loading block index...</source> <translation>Cargando ndice de bloques...</translation> </message> <message> <source>Loading wallet...</source> <translation>Cargando moedeiro...</translation> </message> <message> <source>Cannot downgrade wallet</source> <translation>Non se pode desactualizar o moedeiro</translation> </message> <message> <source>Rescanning...</source> <translation>Rescaneando...</translation> </message> <message> <source>Done loading</source> <translation>Carga completa</translation> </message> <message> <source>Error</source> <translation>Erro</translation> </message> </context> </TS> ```
/content/code_sandbox/src/qt/locale/verge_gl.ts
xml
2016-01-23T04:20:14
2024-08-13T18:07:31
verge
vergecurrency/verge
1,402
9,835
```xml <?xml version="1.0" encoding="utf-8"?> <!-- /* ** ** ** ** path_to_url ** ** Unless required by applicable law or agreed to in writing, software ** WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ --> <resources xmlns:xliff="urn:oasis:names:tc:xliff:document:1.2"> <!-- Symbols that are commonly considered word separators in this language --> <string name="word_separators">.\u0009\u0020,;:!?\'\n()[]*&amp;@{}/&lt;&gt;_+=|\u0022</string> <!-- Symbols that are sentence separators, for purposes of making it hug the last sentence. --> <string name="sentence_separators">.,</string> </resources> ```
/content/code_sandbox/app/src/main/res/values-fr/donottranslate.xml
xml
2016-01-22T21:40:54
2024-08-16T11:54:30
hackerskeyboard
klausw/hackerskeyboard
1,807
175
```xml import { CommonModule } from '@angular/common'; import { AfterContentInit, ChangeDetectionStrategy, ChangeDetectorRef, Component, ContentChild, ContentChildren, ElementRef, Input, NgModule, QueryList, SimpleChange, TemplateRef, ViewEncapsulation, signal } from '@angular/core'; import { BlockableUI, Footer, Header, PrimeTemplate, SharedModule } from 'primeng/api'; import { ObjectUtils } from 'primeng/utils'; /** * Card is a flexible container component. * @group Components */ @Component({ selector: 'p-card', template: ` <div [ngClass]="'p-card p-component'" [ngStyle]="_style()" [class]="styleClass" [attr.data-pc-name]="'card'"> <div class="p-card-header" *ngIf="headerFacet || headerTemplate"> <ng-content select="p-header"></ng-content> <ng-container *ngTemplateOutlet="headerTemplate"></ng-container> </div> <div class="p-card-body"> <div class="p-card-title" *ngIf="header || titleTemplate"> {{ header }} <ng-container *ngTemplateOutlet="titleTemplate"></ng-container> </div> <div class="p-card-subtitle" *ngIf="subheader || subtitleTemplate"> {{ subheader }} <ng-container *ngTemplateOutlet="subtitleTemplate"></ng-container> </div> <div class="p-card-content"> <ng-content></ng-content> <ng-container *ngTemplateOutlet="contentTemplate"></ng-container> </div> <div class="p-card-footer" *ngIf="footerFacet || footerTemplate"> <ng-content select="p-footer"></ng-content> <ng-container *ngTemplateOutlet="footerTemplate"></ng-container> </div> </div> </div> `, changeDetection: ChangeDetectionStrategy.OnPush, encapsulation: ViewEncapsulation.None, styleUrls: ['./card.css'], host: { class: 'p-element' } }) export class Card implements AfterContentInit, BlockableUI { /** * Header of the card. * @group Props */ @Input() header: string | undefined; /** * Subheader of the card. * @group Props */ @Input() subheader: string | undefined; /** * Inline style of the element. * @group Props */ @Input() set style(value: { [klass: string]: any } | null | undefined) { if (!ObjectUtils.equals(this._style(), value)) { this._style.set(value); } } /** * Class of the element. * @group Props */ @Input() styleClass: string | undefined; @ContentChild(Header) headerFacet: TemplateRef<any> | undefined; @ContentChild(Footer) footerFacet: TemplateRef<any> | undefined; @ContentChildren(PrimeTemplate) templates: QueryList<PrimeTemplate> | undefined; headerTemplate: TemplateRef<any> | undefined; titleTemplate: TemplateRef<any> | undefined; subtitleTemplate: TemplateRef<any> | undefined; contentTemplate: TemplateRef<any> | undefined; footerTemplate: TemplateRef<any> | undefined; _style = signal<{ [klass: string]: any } | null | undefined>(null); constructor(private el: ElementRef) {} ngAfterContentInit() { (this.templates as QueryList<PrimeTemplate>).forEach((item) => { switch (item.getType()) { case 'header': this.headerTemplate = item.template; break; case 'title': this.titleTemplate = item.template; break; case 'subtitle': this.subtitleTemplate = item.template; break; case 'content': this.contentTemplate = item.template; break; case 'footer': this.footerTemplate = item.template; break; default: this.contentTemplate = item.template; break; } }); } getBlockableElement(): HTMLElement { return this.el.nativeElement.children[0]; } } @NgModule({ imports: [CommonModule], exports: [Card, SharedModule], declarations: [Card] }) export class CardModule {} ```
/content/code_sandbox/src/app/components/card/card.ts
xml
2016-01-16T09:23:28
2024-08-16T19:58:20
primeng
primefaces/primeng
9,969
915
```xml import {UserRoles} from '../../common/entities/UserDTO'; import {AuthenticationMWs} from '../middlewares/user/AuthenticationMWs'; import {RenderingMWs} from '../middlewares/RenderingMWs'; import {NotificationMWs} from '../middlewares/NotificationMWs'; import {Express} from 'express'; import {VersionMWs} from '../middlewares/VersionMWs'; import {ServerTimingMWs} from '../middlewares/ServerTimingMWs'; import {Config} from '../../common/config/private/Config'; export class NotificationRouter { public static route(app: Express): void { this.addGetNotifications(app); } private static addGetNotifications(app: Express): void { app.get( Config.Server.apiPath + '/notifications', AuthenticationMWs.authenticate, AuthenticationMWs.authorise(UserRoles.Guest), VersionMWs.injectGalleryVersion, NotificationMWs.list, ServerTimingMWs.addServerTiming, RenderingMWs.renderResult ); } } ```
/content/code_sandbox/src/backend/routes/NotificationRouter.ts
xml
2016-03-12T11:46:41
2024-08-16T19:56:44
pigallery2
bpatrik/pigallery2
1,727
207
```xml import { G2Spec } from '../../../src'; export function irisPointShapes(): G2Spec { return { type: 'point', width: 1152, height: 600, data: { type: 'fetch', value: 'data/iris.csv', }, encode: { x: 'x', y: 'y', shape: 'category', color: 'category', size: 5, }, scale: { shape: { range: ['point', 'plus', 'diamond'] }, }, }; } ```
/content/code_sandbox/__tests__/plots/static/iris-point-shapes.ts
xml
2016-05-26T09:21:04
2024-08-15T16:11:17
G2
antvis/G2
12,060
125
```xml <?xml version="1.0" encoding="UTF-8"?> <!-- or more contributor license agreements. See the NOTICE file distributed with this work for additional information regarding copyright ownership. The ASF licenses this file path_to_url Unless required by applicable law or agreed to in writing, "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY specific language governing permissions and limitations --> <!DOCTYPE concept PUBLIC "-//OASIS//DTD DITA Concept//EN" "concept.dtd"> <concept rev="1.3.0" id="admission_control"> <title>Admission Control and Query Queuing</title> <prolog> <metadata> <data name="Category" value="Impala"/> <data name="Category" value="Querying"/> <data name="Category" value="Admission Control"/> <data name="Category" value="Resource Management"/> </metadata> </prolog> <conbody> <p id="admission_control_intro"> Admission control is an Impala feature that imposes limits on concurrent SQL queries, to avoid resource usage spikes and out-of-memory conditions on busy clusters. The admission control feature lets you set an upper limit on the number of concurrent Impala queries and on the memory used by those queries. Any additional queries are queued until the earlier ones finish, rather than being cancelled or running slowly and causing contention. As other queries finish, the queued queries are allowed to proceed. </p> <p rev="2.5.0"> In <keyword keyref="impala25_full"/> and higher, you can specify these limits and thresholds for each pool rather than globally. That way, you can balance the resource usage and throughput between steady well-defined workloads, rare resource-intensive queries, and ad-hoc exploratory queries. </p> <p> In addition to the threshold values for currently executing queries, you can place limits on the maximum number of queries that are queued (waiting) and a limit on the amount of time they might wait before returning with an error. These queue settings let you ensure that queries do not wait indefinitely so that you can detect and correct <q>starvation</q> scenarios. </p> <p> Queries, DML statements, and some DDL statements, including <codeph>CREATE TABLE AS SELECT</codeph> and <codeph>COMPUTE STATS</codeph> are affected by admission control. </p> <p> On a busy cluster, you might find there is an optimal number of Impala queries that run concurrently. For example, when the I/O capacity is fully utilized by I/O-intensive queries, you might not find any throughput benefit in running more concurrent queries. By allowing some queries to run at full speed while others wait, rather than having all queries contend for resources and run slowly, admission control can result in higher overall throughput. </p> <p> For another example, consider a memory-bound workload such as many large joins or aggregation queries. Each such query could briefly use many gigabytes of memory to process intermediate results. Because Impala by default cancels queries that exceed the specified memory limit, running multiple large-scale queries at once might require re-running some queries that are cancelled. In this case, admission control improves the reliability and stability of the overall workload by only allowing as many concurrent queries as the overall memory of the cluster can accommodate. </p> <p outputclass="toc inpage"/> </conbody> <concept id="admission_concurrency"> <title>Concurrent Queries and Admission Control</title> <conbody> <p> One way to limit resource usage through admission control is to set an upper limit on the number of concurrent queries. This is the initial technique you might use when you do not have extensive information about memory usage for your workload. The settings can be specified separately for each dynamic resource pool. </p> <dl> <dlentry> <dt> Max Running Queries </dt> <dd><p>Maximum number of concurrently running queries in this pool. The default value is unlimited for Impala 2.5 or higher. (optional)</p> The maximum number of queries that can run concurrently in this pool. The default value is unlimited. Any queries for this pool that exceed <uicontrol>Max Running Queries</uicontrol> are added to the admission control queue until other queries finish. You can use <uicontrol>Max Running Queries</uicontrol> in the early stages of resource management, when you do not have extensive data about query memory usage, to determine if the cluster performs better overall if throttling is applied to Impala queries. <p> For a workload with many small queries, you typically specify a high value for this setting, or leave the default setting of <q>unlimited</q>. For a workload with expensive queries, where some number of concurrent queries saturate the memory, I/O, CPU, or network capacity of the cluster, set the value low enough that the cluster resources are not overcommitted for Impala. </p><p>Once you have enabled memory-based admission control using other pool settings, you can still use <uicontrol>Max Running Queries</uicontrol> as a safeguard. If queries exceed either the total estimated memory or the maximum number of concurrent queries, they are added to the queue. </p> </dd> </dlentry> </dl> <dl> <dlentry> <dt> Max Queued Queries </dt> <dd> Maximum number of queries that can be queued in this pool. The default value is 200 for Impala 2.1 or higher and 50 for previous versions of Impala. (optional)</dd> </dlentry> </dl> <dl> <dlentry> <dt> Queue Timeout </dt> <dd> The amount of time, in milliseconds, that a query waits in the admission control queue for this pool before being canceled. The default value is 60,000 milliseconds. <p>In the following cases, <uicontrol>Queue Timeout</uicontrol> is not significant, and you can specify a high value to avoid canceling queries unexpectedly:<ul id="ul_kzr_rbg_gw"> <li>In a low-concurrency workload where few or no queries are queued</li> <li>In an environment without a strict SLA, where it does not matter if queries occasionally take longer than usual because they are held in admission control</li> </ul>You might also need to increase the value to use Impala with some business intelligence tools that have their own timeout intervals for queries. </p><p>In a high-concurrency workload, especially for queries with a tight SLA, long wait times in admission control can cause a serious problem. For example, if a query needs to run in 10 seconds, and you have tuned it so that it runs in 8 seconds, it violates its SLA if it waits in the admission control queue longer than 2 seconds. In a case like this, set a low timeout value and monitor how many queries are cancelled because of timeouts. This technique helps you to discover capacity, tuning, and scaling problems early, and helps avoid wasting resources by running expensive queries that have already missed their SLA. </p><p> If you identify some queries that can have a high timeout value, and others that benefit from a low timeout value, you can create separate pools with different values for this setting. </p> </dd> </dlentry> </dl> <p> You can combine these settings with the memory-based approach described in <xref href="impala_admission.xml#admission_memory"/>. If either the maximum number of or the expected memory usage of the concurrent queries is exceeded, subsequent queries are queued until the concurrent workload falls below the threshold again. </p> </conbody> </concept> <concept id="admission_memory"> <title>Memory Limits and Admission Control</title> <conbody> <p> Each dynamic resource pool can have an upper limit on the cluster-wide memory used by queries executing in that pool. This is the technique to use once you have a stable workload with well-understood memory requirements. </p> <p>Use the following settings to manage memory-based admission control.</p> <dl> <dlentry> <dt>Max Memory</dt> <dd> <p> The maximum amount of aggregate memory available across the cluster to all queries executing in this pool. This should be a portion of the aggregate configured memory for Impala daemons, which will be shown in the settings dialog next to this option for convenience. Setting this to a non-zero value enables memory based admission control. </p> <p> Impala determines the expected maximum memory used by all queries in the pool and holds back any further queries that would result in Max Memory being exceeded. </p> <p> You set Max Memory in <codeph>fair-scheduler.xml</codeph> file with the <codeph>maxResources</codeph> tag. For example: <codeph>&lt;maxResources>2500 mb&lt;/maxResources></codeph> </p> <p> If you specify Max Memory, you should specify the amount of memory to allocate to each query in this pool. You can do this in two ways: </p> <ul> <li>By setting Maximum Query Memory Limit and Minimum Query Memory Limit. This is preferred in <keyword keyref="impala31_full"/> and greater and gives Impala flexibility to set aside more memory to queries that are expected to be memory-hungry.</li> <li>By setting Default Query Memory Limit to the exact amount of memory that Impala should set aside for queries in that pool.</li> </ul> <p> Note that in the following cases, Impala will rely entirely on memory estimates to determine how much memory to set aside for each query. This is not recommended because it can result in queries not running or being starved for memory if the estimates are inaccurate. And it can affect other queries running on the same node. <ul> <li>Max Memory, Maximum Query Memory Limit, and Minimum Query Memory Limit are not set, and the <codeph>MEM_LIMIT</codeph> query option is not set for the query.</li> <li>Default Query Memory Limit is set to 0, and the <codeph>MEM_LIMIT</codeph> query option is not set for the query.</li> </ul> </p> </dd> </dlentry> <dlentry> <dt>Minimum Query Memory Limit and Maximum Query Memory Limit</dt> <dd> <p>These are <codeph>impala.admission-control.min-query-mem-limit.*</codeph> and <codeph>impala.admission-control.max-query-mem-limit.*</codeph> configurations in <filepath>llama-site.xml</filepath> (See <xref href="impala_admission_config.xml#concept_cz4_vxz_jgb"/>). They determine the minimum and maximum per-host memory limit that will be chosen by Impala Admission control for queries in this resource pool. If set, Impala Admission Control will choose a memory limit between the minimum and maximum values based on the per-host memory estimate for the query. The memory limit chosen determines the amount of memory that Impala Admission control will set aside for this query on each host that the query is running on. The aggregate memory across all of the hosts that the query is running on is counted against the pools Max Memory.</p> <p>Minimum Query Memory Limit must be less than or equal to Maximum Query Memory Limit and Max Memory.</p> <p>A user can override Impalas choice of memory limit by setting the <codeph>MEM_LIMIT</codeph> query option. If the Clamp MEM_LIMIT Query Option setting is set to <codeph>TRUE</codeph> and the user sets <codeph>MEM_LIMIT</codeph> to a value that is outside of the range specified by these two options, then the effective memory limit will be either the minimum or maximum, depending on whether <codeph>MEM_LIMIT</codeph> is lower than or higher the range.</p> <p>For example, assume a resource pool with the following parameters set: <ul> <li>Minimum Query Memory Limit = 2GB</li> <li>Maximum Query Memory Limit = 10GB</li> </ul>If a user tries to submit a query with the <codeph>MEM_LIMIT</codeph> query option set to 14 GB, the following would happen:<ul> <li>If Clamp MEM_LIMIT Query Option = true, admission controller would override <codeph>MEM_LIMIT</codeph> with 10 GB and attempt admission using that value.</li> <li>If Clamp MEM_LIMIT Query Option = false, the admission controller will retain the <codeph>MEM_LIMIT</codeph> of 14 GB set by the user and will attempt admission using the value.</li> </ul></p> </dd> </dlentry> <dlentry> <dt>Default Query Memory Limit</dt> <dd>The default memory limit applied to queries executing in this pool when no explicit <codeph>MEM_LIMIT</codeph> query option is set. The memory limit chosen determines the amount of memory that Impala Admission control will set aside for this query on each host that the query is running on. The aggregate memory across all of the hosts that the query is running on is counted against the pools Max Memory. This option is deprecated in <keyword keyref="impala31_full" /> and higher and is replaced by Maximum Query Memory Limit and Minimum Query Memory Limit. Do not set this if either Maximum Query Memory Limit or Minimum Query Memory Limit is set.</dd> </dlentry> </dl> <dl> <dlentry> <dt> Clamp MEM_LIMIT Query Option</dt> <dd>This is <codeph>impala.admission-control.clamp-mem-limit-query-option.*</codeph> configuration in <filepath>llama-site.xml</filepath>. If this configuration is set to <codeph>false</codeph>, the <codeph>MEM_LIMIT</codeph> query option will not be bounded by the <b>Maximum Query Memory Limit</b> and the <b>Minimum Query Memory Limit</b> values specified for this resource pool. By default, this configuration is set to <codeph>true</codeph> in Impala 3.1 and higher. This configuration is ignored if both <b>Minimum Query Memory Limit</b> and <b>Maximum Query Memory Limit</b> are not set.</dd> </dlentry> </dl> <p conref="../shared/impala_common.xml#common/admission_control_mem_limit_interaction"/> <p> You can combine the memory-based settings with the upper limit on concurrent queries described in <xref href="impala_admission.xml#admission_concurrency"/>. If either the maximum number of or the expected memory usage of the concurrent queries is exceeded, subsequent queries are queued until the concurrent workload falls below the threshold again. </p> </conbody> </concept> <concept id="set_per_query_memory_limits"> <title>Setting Per-query Memory Limits</title> <conbody> <p>Use per-query memory limits to prevent queries from consuming excessive memory resources that impact other queries. We recommend that you set the query memory limits whenever possible.</p> <p>If you set the <b>Max Memory</b> for a resource pool, Impala attempts to throttle queries if there is not enough memory to run them within the specified resources.</p> <p>Only use admission control with maximum memory resources if you can ensure there are query memory limits. Set the pool <b>Maximum Query Memory Limit</b> to be certain. You can override this setting with the <codeph>MEM_LIMIT</codeph> query option, if necessary.</p> <p>Typically, you set query memory limits using the <codeph>set MEM_LIMIT=Xg;</codeph> query option. When you find the right value for your business case, memory-based admission control works well. The potential downside is that queries that attempt to use more memory might perform poorly or even be cancelled.</p> </conbody> </concept> <concept id="examples_of_query_rejection_by_admission_control"> <title>Examples of Query Rejection by Admission Control</title> <conbody> <dl> <dlentry> <dt>The minimum memory to start a query is not satisfied</dt> <dd> <p>Impala will attempt to start a query as long as the minimum memory requirement to run that query can be satisfied by all executor nodes. In the event where Admission Control determines that the minimum memory requirement can not be satisfied by existing memory limit configurations (<codeph>MEM_LIMIT</codeph> query option or other memory limit configurations at request pool) or available system memory in one or more executor nodes, it will reject the query and the query will not execute at all. Admission Control will return an error message describing what is happening and recommend which configuration to adjust so that the query can pass Admission Control. Take a look at the last query examples from <xref href="impala_mem_limit.xml"/></p> <codeblock rev=""> [localhost:21000] > set mem_limit=15mb; MEM_LIMIT set to 15mb [localhost:21000] > select count(distinct c_name) from customer; Query: select count(distinct c_name) from customer ERROR: Rejected query from pool default-pool: minimum memory reservation is greater than memory available to the query for buffer reservations. Memory reservation needed given the current plan: 38.00 MB. Adjust MEM_LIMIT option for the query to allow the query memory limit to be at least 70.00 MB. Note that changing the memory limit may also change the plan. See 'Per Host Min Memory Reservation' in the query profile for more information about the per-node memory requirements.</codeblock> <p>Admission Control rejects this query because <codeph>MEM_LIMIT</codeph> is set too low such that it is insufficient to start the query, which requires 70.00 MB (38.00 MB + 32.00 MB overhead) at minimum for one or more executor nodes. The error message contains recommendations on what configuration to adjust depending on which limitation causes rejection. In this case, Admission Controller recommends raising query option <codeph>MEM_LIMIT</codeph> &gt;= 70mb so that the minimum memory requirement is satisfied to start the query. Users can also inspect 'Per Host Min Memory Reservation' info at the query profile to check which executor node(s) require 38.00 MB minimum memory reservation.</p> </dd> </dlentry> </dl> </conbody> </concept> <concept id="admission_yarn"> <title>How Impala Admission Control Relates to Other Resource Management Tools</title> <prolog> <metadata> <data name="Category" value="Concepts"/> </metadata> </prolog> <conbody> <p> The admission control feature is similar in some ways to the YARN resource management framework. These features can be used separately or together. This section describes some similarities and differences, to help you decide which combination of resource management features to use for Impala. </p> <p> Admission control is a lightweight, decentralized system that is suitable for workloads consisting primarily of Impala queries and other SQL statements. It sets <q>soft</q> limits that smooth out Impala memory usage during times of heavy load, rather than taking an all-or-nothing approach that cancels jobs that are too resource-intensive. </p> <p> Because the admission control system does not interact with other Hadoop workloads such as MapReduce jobs, you might use YARN with static service pools on clusters where resources are shared between Impala and other Hadoop components. This configuration is recommended when using Impala in a <term>multitenant</term> cluster. Devote a percentage of cluster resources to Impala, and allocate another percentage for MapReduce and other batch-style workloads. Let admission control handle the concurrency and memory usage for the Impala work within the cluster, and let YARN manage the work for other components within the cluster. In this scenario, Impala's resources are not managed by YARN. </p> <p> The Impala admission control feature uses the same configuration mechanism as the YARN resource manager to map users to pools and authenticate them. </p> <p> Although the Impala admission control feature uses a <codeph>fair-scheduler.xml</codeph> configuration file behind the scenes, this file does not depend on which scheduler is used for YARN. You still use this file even when YARN is using the capacity scheduler. </p> </conbody> </concept> <concept id="admission_architecture"> <title>How Impala Schedules and Enforces Limits on Concurrent Queries</title> <prolog> <metadata> <data name="Category" value="Concepts"/> <data name="Category" value="Scheduling"/> </metadata> </prolog> <conbody> <p> The admission control system is decentralized, embedded in each Impala daemon and communicating through the statestore mechanism. Although the limits you set for memory usage and number of concurrent queries apply cluster-wide, each Impala daemon makes its own decisions about whether to allow each query to run immediately or to queue it for a less-busy time. These decisions are fast, meaning the admission control mechanism is low-overhead, but might be imprecise during times of heavy load across many coordinators. There could be times when the more queries were queued (in aggregate across the cluster) than the specified limit, or when number of admitted queries exceeds the expected number. Thus, you typically err on the high side for the size of the queue, because there is not a big penalty for having a large number of queued queries; and you typically err on the low side for configuring memory resources, to leave some headroom in case more queries are admitted than expected, without running out of memory and being cancelled as a result. </p> <p> To avoid a large backlog of queued requests, you can set an upper limit on the size of the queue for queries that are queued. When the number of queued queries exceeds this limit, further queries are cancelled rather than being queued. You can also configure a timeout period per pool, after which queued queries are cancelled, to avoid indefinite waits. If a cluster reaches this state where queries are cancelled due to too many concurrent requests or long waits for query execution to begin, that is a signal for an administrator to take action, either by provisioning more resources, scheduling work on the cluster to smooth out the load, or by doing <xref href="impala_performance.xml#performance">Impala performance tuning</xref> to enable higher throughput. </p> </conbody> </concept> <concept id="admission_jdbc_odbc"> <title>How Admission Control works with Impala Clients (JDBC, ODBC, HiveServer2)</title> <prolog> <metadata> <data name="Category" value="JDBC"/> <data name="Category" value="ODBC"/> <data name="Category" value="HiveServer2"/> <data name="Category" value="Concepts"/> </metadata> </prolog> <conbody> <p> Most aspects of admission control work transparently with client interfaces such as JDBC and ODBC: </p> <ul> <li> If a SQL statement is put into a queue rather than running immediately, the API call blocks until the statement is dequeued and begins execution. At that point, the client program can request to fetch results, which might also block until results become available. </li> <li> If a SQL statement is cancelled because it has been queued for too long or because it exceeded the memory limit during execution, the error is returned to the client program with a descriptive error message. </li> </ul> <p rev=""> In Impala 2.0 and higher, you can submit a SQL <codeph>SET</codeph> statement from the client application to change the <codeph>REQUEST_POOL</codeph> query option. This option lets you submit queries to different resource pools, as described in <xref href="impala_request_pool.xml#request_pool"/>. </p> <p> At any time, the set of queued queries could include queries submitted through multiple different Impala daemon hosts. All the queries submitted through a particular host will be executed in order, so a <codeph>CREATE TABLE</codeph> followed by an <codeph>INSERT</codeph> on the same table would succeed. Queries submitted through different hosts are not guaranteed to be executed in the order they were received. Therefore, if you are using load-balancing or other round-robin scheduling where different statements are submitted through different hosts, set up all table structures ahead of time so that the statements controlled by the queuing system are primarily queries, where order is not significant. Or, if a sequence of statements needs to happen in strict order (such as an <codeph>INSERT</codeph> followed by a <codeph>SELECT</codeph>), submit all those statements through a single session, while connected to the same Impala daemon host. </p> <p> Admission control has the following limitations or special behavior when used with JDBC or ODBC applications: </p> <ul> <li> The other resource-related query options, <codeph>RESERVATION_REQUEST_TIMEOUT</codeph> and <codeph>V_CPU_CORES</codeph>, are no longer used. Those query options only applied to using Impala with Llama, which is no longer supported. </li> </ul> </conbody> </concept> <concept id="admission_schema_config"> <title>SQL and Schema Considerations for Admission Control</title> <conbody> <p> When queries complete quickly and are tuned for optimal memory usage, there is less chance of performance or capacity problems during times of heavy load. Before setting up admission control, tune your Impala queries to ensure that the query plans are efficient and the memory estimates are accurate. Understanding the nature of your workload, and which queries are the most resource-intensive, helps you to plan how to divide the queries into different pools and decide what limits to define for each pool. </p> <p> For large tables, especially those involved in join queries, keep their statistics up to date after loading substantial amounts of new data or adding new partitions. Use the <codeph>COMPUTE STATS</codeph> statement for unpartitioned tables, and <codeph>COMPUTE INCREMENTAL STATS</codeph> for partitioned tables. </p> <p> When you use dynamic resource pools with a <uicontrol>Max Memory</uicontrol> setting enabled, you typically override the memory estimates that Impala makes based on the statistics from the <codeph>COMPUTE STATS</codeph> statement. You either set the <codeph>MEM_LIMIT</codeph> query option within a particular session to set an upper memory limit for queries within that session, or a default <codeph>MEM_LIMIT</codeph> setting for all queries processed by the <cmdname>impalad</cmdname> instance, or a default <codeph>MEM_LIMIT</codeph> setting for all queries assigned to a particular dynamic resource pool. By designating a consistent memory limit for a set of similar queries that use the same resource pool, you avoid unnecessary query queuing or out-of-memory conditions that can arise during high-concurrency workloads when memory estimates for some queries are inaccurate. </p> <p> Follow other steps from <xref href="impala_performance.xml#performance"/> to tune your queries. </p> </conbody> </concept> <concept id="admission_guidelines"> <title>Guidelines for Using Admission Control</title> <prolog> <metadata> <data name="Category" value="Planning"/> <data name="Category" value="Guidelines"/> <data name="Category" value="Best Practices"/> </metadata> </prolog> <conbody> <p> The limits imposed by admission control are de-centrally managed <q>soft</q> limits. Each Impala coordinator node makes its own decisions about whether to allow queries to run immediately or to queue them. These decisions rely on information passed back and forth between nodes by the StateStore service. If a sudden surge in requests causes more queries than anticipated to run concurrently, then the throughput could decrease due to queries spilling to disk or contending for resources. Or queries could be cancelled if they exceed the <codeph>MEM_LIMIT</codeph> setting while running. </p> <p> In <cmdname>impala-shell</cmdname>, you can also specify which resource pool to direct queries to by setting the <codeph>REQUEST_POOL</codeph> query option. </p> <p> To see how admission control works for particular queries, examine the profile output or the summary output for the query. <ul> <li>Profile<p>The information is available through the <codeph>PROFILE</codeph> statement in <cmdname>impala-shell</cmdname> immediately after running a query in the shell, on the <uicontrol>queries</uicontrol> page of the Impala debug web UI, or in the Impala log file (basic information at log level 1, more detailed information at log level 2). </p><p>The profile output contains details about the admission decision, such as whether the query was queued or not and which resource pool it was assigned to. It also includes the estimated and actual memory usage for the query, so you can fine-tune the configuration for the memory limits of the resource pools. </p></li> <li>Summary<p>Starting in <keyword keyref="impala31"/>, the information is available in <cmdname>impala-shell</cmdname> when the <codeph>LIVE_PROGRESS</codeph> or <codeph>LIVE_SUMMARY</codeph> query option is set to <codeph>TRUE</codeph>.</p><p>You can also start an <codeph>impala-shell</codeph> session with the <codeph>--live_progress</codeph> or <codeph>--live_summary</codeph> flags to monitor all queries in that <codeph>impala-shell</codeph> session.</p><p>The summary output includes the queuing status consisting of whether the query was queued and what was the latest queuing reason.</p></li> </ul></p> <p> For details about all the Fair Scheduler configuration settings, see <xref keyref="FairScheduler">Fair Scheduler Configuration</xref>, in particular the tags such as <codeph>&lt;queue&gt;</codeph> and <codeph>&lt;aclSubmitApps&gt;</codeph> to map users and groups to particular resource pools (queues). </p> </conbody> </concept> </concept> ```
/content/code_sandbox/docs/topics/impala_admission.xml
xml
2016-04-13T07:00:08
2024-08-16T10:10:44
impala
apache/impala
1,115
7,296
```xml <clickhouse> <keeper_server> <tcp_port>9181</tcp_port> <server_id>1</server_id> <log_storage_path>/var/lib/clickhouse/coordination/log</log_storage_path> <snapshot_storage_path>/var/lib/clickhouse/coordination/snapshots</snapshot_storage_path> <enable_reconfiguration>true</enable_reconfiguration> <coordination_settings> <operation_timeout_ms>5000</operation_timeout_ms> <session_timeout_ms>10000</session_timeout_ms> <raft_logs_level>trace</raft_logs_level> </coordination_settings> <raft_configuration> <server> <id>1</id> <hostname>node1</hostname> <port>9234</port> </server> <server> <id>2</id> <hostname>node2</hostname> <port>9234</port> <start_as_follower>true</start_as_follower> </server> <server> <id>3</id> <hostname>node3</hostname> <port>9234</port> <start_as_follower>true</start_as_follower> </server> </raft_configuration> </keeper_server> </clickhouse> ```
/content/code_sandbox/tests/integration/test_keeper_reconfig_replace_leader/configs/keeper1.xml
xml
2016-06-02T08:28:18
2024-08-16T18:39:33
ClickHouse
ClickHouse/ClickHouse
36,234
281
```xml import * as React from 'react'; import { TelemetryPosition } from './useTelemetryState'; import { CellAlign } from './useTelemetryColumns'; type CellColor = { backgroundColor: string; color: string }; const CELL_COLORS_STYLES: CellColor[] = [ { backgroundColor: '#ffffff', color: '#000000' }, { backgroundColor: '#ffffcc', color: '#000000' }, { backgroundColor: '#ffeda0', color: '#000000' }, { backgroundColor: '#fed976', color: '#000000' }, { backgroundColor: '#feb24c', color: '#000000' }, { backgroundColor: '#fd8d3c', color: '#000000' }, { backgroundColor: '#fc4e2a', color: '#000000' }, { backgroundColor: '#e31a1c', color: '#ffffff' }, { backgroundColor: '#bd0026', color: '#ffffff' }, { backgroundColor: '#800026', color: '#ffffff' }, ]; const getCellColorStyles = (p: number): CellColor => CELL_COLORS_STYLES[Math.round((CELL_COLORS_STYLES.length - 1) * p)]; export const controls = (): React.CSSProperties => ({ border: '1px solid #e5e5e4', borderBottom: 'none', alignItems: 'center', display: 'grid', gridTemplateColumns: '1fr auto', gridGap: 5, padding: 4, }); export const panel = ({ position }: { position: TelemetryPosition }): React.CSSProperties => ({ background: 'rgba(245, 245, 245)', color: '#565554', fontSize: '12px', position: 'fixed', minWidth: 500, zIndex: 1000, ...(position === 'bottom-left' && { left: 0, bottom: 0, }), ...(position === 'bottom-right' && { right: 0, bottom: 0, }), ...(position === 'top-left' && { left: 0, top: 0, }), ...(position === 'top-right' && { right: 0, top: 0, }), }); export const help = (): React.CSSProperties => ({ background: '#fff', border: '1px solid #e5e5e4', borderBottom: 'none', }); export const performanceFlags = (): React.CSSProperties => ({ border: '1px solid #e5e5e4', borderBottom: 'none', flex: 1, padding: 10, }); export const performanceFlag = (): React.CSSProperties => ({ display: 'flex', }); export const performanceFlagLabel = (): React.CSSProperties => ({ marginLeft: 5, }); export const tabs = (): React.CSSProperties => ({ border: '1px solid #e5e5e4', display: 'flex', }); export const tab = ({ active }: { active?: boolean }): React.CSSProperties => ({ background: 'transparent', borderColor: 'transparent', borderRadius: 0, borderWidth: '0 0 2px 0', padding: '4px 8px', outline: 0, ...(active && { borderColor: '#052ffb' }), }); export const table = (): React.CSSProperties => ({ background: '#fff', border: '1px solid #e5e5e4', borderBottom: 'none', borderCollapse: 'collapse', width: '100%', }); export const tableCell = ({ align, percentageRatio, }: { align?: CellAlign; percentageRatio?: number; }): React.CSSProperties => ({ border: '1px solid #e5e5e4', padding: 2, textAlign: 'right', ...(align && { textAlign: align }), ...(percentageRatio && getCellColorStyles(percentageRatio)), }); export const tableFooterCell = ({ align }: { align?: CellAlign }): React.CSSProperties => ({ fontWeight: 'bold', textAlign: 'right', ...(align && { textAlign: align }), }); export const tableCheckbox = (): React.CSSProperties => ({ marginLeft: 5, }); export const tableControls = (): React.CSSProperties => ({ border: '1px solid #e5e5e4', borderBottom: 'none', alignItems: 'center', display: 'grid', gridTemplateColumns: 'auto 100px 1fr auto auto', gridGap: 5, padding: 6, }); export const tableFilter = (): React.CSSProperties => ({ marginLeft: 5, width: 100, }); export const tableHeader = ({ isFirstInSubgroup, isLastInSubgroup, subgroup, }: { isFirstInSubgroup: boolean; isLastInSubgroup: boolean; subgroup: 'styles' | 'timers'; }): React.CSSProperties => ({ border: '1px solid #e5e5e4', padding: 4, ...(subgroup && { background: 'rgba(245, 245, 245, 0.75)', borderBottomStyle: 'solid', borderBottomWidth: '2px', borderLeftColor: 'transparent', borderRightColor: 'transparent', fontWeight: 'normal', ...(isFirstInSubgroup && { background: 'transparent', fontWeight: 'bold', }), ...(isLastInSubgroup && { borderRightColor: '#e5e5e4' }), }), ...(subgroup === 'timers' && { borderBottomColor: 'cornflowerblue', }), ...(subgroup === 'styles' && { borderBottomColor: 'salmon', }), }); export const tableSort = (): React.CSSProperties => ({ fontSize: 10 }); ```
/content/code_sandbox/packages/fluentui/react-telemetry/src/styles.ts
xml
2016-06-06T15:03:44
2024-08-16T18:49:29
fluentui
microsoft/fluentui
18,221
1,249
```xml <?xml version="1.0" encoding="utf-8"?> <Project ToolsVersion="4.0" xmlns="path_to_url"> <ItemGroup> <Filter Include="Header Files"> <UniqueIdentifier>{ba5fa1b8-1783-4b3b-9a41-31d363b52841}</UniqueIdentifier> </Filter> </ItemGroup> <ItemGroup> <ClInclude Include="..\..\sparsepp\spp.h"> <Filter>Header Files</Filter> </ClInclude> </ItemGroup> </Project> ```
/content/code_sandbox/examples/vsprojects/serialize_stream.vcxproj.filters
xml
2016-08-21T21:33:02
2024-08-12T19:24:29
sparsepp
greg7mdp/sparsepp
1,240
126
```xml import {nameOf} from "@tsed/core"; import {Controller} from "../decorators/controller.js"; import {Module1} from "./__mock__/module1/Module1.js"; import {Module2} from "./__mock__/module2/Module2.js"; import {M1Ctrl1} from "./__mock__/module1/controllers/M1Ctrl1.js"; import {M2Ctrl} from "./__mock__/module2/controllers/M2Ctrl.js"; import {resolveControllers} from "./resolveControllers.js"; @Controller("/root") class TestCtrl {} describe("resolveControllers", () => { it("should load providers and merge configuration", () => { const configuration = { mount: { "/rest": [TestCtrl] }, imports: [Module1, Module2] }; const result = resolveControllers(configuration); const routes = result.map((item) => ({...item, token: nameOf(item.token)})); expect(routes).toEqual([ { route: "/m1", token: "M1Ctrl1" }, { route: "/mod2", token: "M2Ctrl" }, { route: "/rest", token: "TestCtrl" } ]); }); }); ```
/content/code_sandbox/packages/di/src/common/utils/resolveControllers.spec.ts
xml
2016-02-21T18:38:47
2024-08-14T21:19:48
tsed
tsedio/tsed
2,817
264
```xml import { createSlice, PayloadAction } from "@reduxjs/toolkit"; import { RQSessionEvents } from "@requestly/web-sdk"; import { ReducerKeys } from "store/constants"; import { SessionRecordingMetadata, Visibility } from "views/features/sessions/SessionViewer/types"; export interface SessionRecordingState { metadata?: SessionRecordingMetadata; events?: RQSessionEvents; trimmedSessionData?: { duration: number; events: RQSessionEvents; }; } const initialState: SessionRecordingState = { metadata: null, events: null, trimmedSessionData: null, }; const slice = createSlice({ name: ReducerKeys.SESSION_RECORDING, initialState, reducers: { resetState: () => initialState, setSessionRecordingMetadata: (state, action: PayloadAction<SessionRecordingMetadata>) => { state.metadata = action.payload; }, setEvents: (state, action: PayloadAction<RQSessionEvents>) => { state.events = action.payload; }, setVisibility: (state, action: PayloadAction<Visibility>) => { state.metadata.visibility = action.payload; }, setName: (state, action: PayloadAction<string>) => { state.metadata.name = action.payload; }, setStartTimeOffset: (state, action: PayloadAction<number>) => { state.metadata.startTimeOffset = action.payload; }, setDescription: (state, action: PayloadAction<string>) => { state.metadata.description = action.payload; }, setTrimmedSessiondata: (state, action: PayloadAction<{ duration: number; events: RQSessionEvents }>) => { state.trimmedSessionData = action.payload; }, }, }); export const { actions: sessionRecordingActions, reducer: sessionRecordingReducer } = slice; ```
/content/code_sandbox/app/src/store/features/session-recording/slice.ts
xml
2016-12-01T04:36:06
2024-08-16T19:12:19
requestly
requestly/requestly
2,121
380
```xml /* * @license Apache-2.0 * * * * path_to_url * * Unless required by applicable law or agreed to in writing, software * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ import itercugmean = require( './index' ); /** * Returns an iterator protocol-compliant object. * * @returns iterator protocol-compliant object */ function iterator() { return { 'next': next }; /** * Implements the iterator protocol `next` method. * * @returns iterator protocol-compliant object */ function next() { return { 'value': true, 'done': false }; } } // TESTS // // The function returns an iterator... { itercugmean( iterator() ); // $ExpectType Iterator } // The compiler throws an error if the function is provided a value other than an iterator protocol-compliant object... { itercugmean( '5' ); // $ExpectError itercugmean( 5 ); // $ExpectError itercugmean( true ); // $ExpectError itercugmean( false ); // $ExpectError itercugmean( null ); // $ExpectError itercugmean( undefined ); // $ExpectError itercugmean( [] ); // $ExpectError itercugmean( {} ); // $ExpectError itercugmean( ( x: number ): number => x ); // $ExpectError } // The compiler throws an error if the function is provided insufficient arguments... { itercugmean(); // $ExpectError } ```
/content/code_sandbox/lib/node_modules/@stdlib/stats/iter/cugmean/docs/types/test.ts
xml
2016-03-24T04:19:52
2024-08-16T09:03:19
stdlib
stdlib-js/stdlib
4,266
346
```xml export * from './layout'; export * from './WalletCreationModal'; export * from './BitcoinSendModal'; export * from './Balance'; export * from './DataList'; export * from './MetricsAndCtas'; ```
/content/code_sandbox/applications/wallet/src/app/components/index.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
45
```xml // See LICENSE in the project root for license information. import * as semver from 'semver'; import type { IScopedLogger } from '@rushstack/heft'; import { FileError, InternalError } from '@rushstack/node-core-library'; import type { ITerminal } from '@rushstack/terminal'; import type * as TApiExtractor from '@microsoft/api-extractor'; export interface IApiExtractorRunnerConfiguration { /** * The root folder of the build. */ buildFolder: string; /** * The loaded and prepared Extractor config file ("api-extractor.json") */ apiExtractorConfiguration: TApiExtractor.ExtractorConfig; /** * The imported @microsoft/api-extractor package */ apiExtractor: typeof TApiExtractor; /** * The path to the typescript package * * For example, /home/username/code/repo/project/node_modules/typescript */ typescriptPackagePath: string | undefined; /** * If set to true, run API Extractor in production mode */ production: boolean; /** * The scoped logger to use for logging */ scopedLogger: IScopedLogger; } const MIN_SUPPORTED_MAJOR_VERSION: number = 7; const MIN_SUPPORTED_MINOR_VERSION: number = 10; export class ApiExtractorRunner { private readonly _configuration: IApiExtractorRunnerConfiguration; private readonly _scopedLogger: IScopedLogger; private readonly _terminal: ITerminal; private readonly _apiExtractor: typeof TApiExtractor; public constructor(configuration: IApiExtractorRunnerConfiguration) { this._configuration = configuration; this._apiExtractor = configuration.apiExtractor; this._scopedLogger = configuration.scopedLogger; this._terminal = configuration.scopedLogger.terminal; } public async invokeAsync(): Promise<void> { this._scopedLogger.terminal.writeLine( `Using API Extractor version ${this._apiExtractor.Extractor.version}` ); const apiExtractorVersion: semver.SemVer | null = semver.parse(this._apiExtractor.Extractor.version); if ( !apiExtractorVersion || apiExtractorVersion.major < MIN_SUPPORTED_MAJOR_VERSION || (apiExtractorVersion.major === MIN_SUPPORTED_MAJOR_VERSION && apiExtractorVersion.minor < MIN_SUPPORTED_MINOR_VERSION) ) { this._scopedLogger.emitWarning(new Error(`Heft requires API Extractor version 7.10.0 or newer`)); } const extractorConfig: TApiExtractor.ExtractorConfig = this._configuration.apiExtractorConfiguration; const extractorOptions: TApiExtractor.IExtractorInvokeOptions = { localBuild: !this._configuration.production, typescriptCompilerFolder: this._configuration.typescriptPackagePath, messageCallback: (message: TApiExtractor.ExtractorMessage) => { switch (message.logLevel) { case this._apiExtractor.ExtractorLogLevel.Error: case this._apiExtractor.ExtractorLogLevel.Warning: { let errorToEmit: Error | undefined; if (message.sourceFilePath) { errorToEmit = new FileError(`(${message.messageId}) ${message.text}`, { absolutePath: message.sourceFilePath, projectFolder: this._configuration.buildFolder, line: message.sourceFileLine, column: message.sourceFileColumn }); } else { errorToEmit = new Error(message.text); } if (message.logLevel === this._apiExtractor.ExtractorLogLevel.Error) { this._scopedLogger.emitError(errorToEmit); } else if (message.logLevel === this._apiExtractor.ExtractorLogLevel.Warning) { this._scopedLogger.emitWarning(errorToEmit); } else { // Should never happen, but just in case throw new InternalError(`Unexpected log level: ${message.logLevel}`); } break; } case this._apiExtractor.ExtractorLogLevel.Verbose: { this._terminal.writeVerboseLine(message.text); break; } case this._apiExtractor.ExtractorLogLevel.Info: { this._terminal.writeLine(message.text); break; } case this._apiExtractor.ExtractorLogLevel.None: { // Ignore messages with ExtractorLogLevel.None break; } default: this._scopedLogger.emitError( new Error(`Unexpected API Extractor log level: ${message.logLevel}`) ); } message.handled = true; } }; const apiExtractorResult: TApiExtractor.ExtractorResult = this._apiExtractor.Extractor.invoke( extractorConfig, extractorOptions ); if (!apiExtractorResult.succeeded) { this._scopedLogger.emitError(new Error('API Extractor failed.')); } else if (apiExtractorResult.apiReportChanged && this._configuration.production) { this._scopedLogger.emitError(new Error('API Report changed while in production mode.')); } } } ```
/content/code_sandbox/heft-plugins/heft-api-extractor-plugin/src/ApiExtractorRunner.ts
xml
2016-09-30T00:28:20
2024-08-16T18:54:35
rushstack
microsoft/rushstack
5,790
1,035
```xml import { render, within } from '@testing-library/react'; import EncryptionStatusIcon from './EncryptionStatusIcon'; describe('EncryptionStatusIcon', () => { describe('when loading is true', () => { it('should render loader', () => { const { getByTestId, getByText } = render(<EncryptionStatusIcon loading />); getByTestId('circle-loader'); getByText('Loading'); }); }); describe('when fill or encrypted is undefined', () => { it('should not render anything', () => { const { container } = render(<EncryptionStatusIcon fill={undefined} loading={false} />); expect(container.firstChild).toBeNull(); }); it('should not render anything', () => { const { container } = render(<EncryptionStatusIcon isEncrypted={undefined} loading={false} />); expect(container.firstChild).toBeNull(); }); }); describe('when isDetailsModal is true', () => { it('should not render icon in span', () => { const props = { isEncrypted: true, fill: 2, text: 'End to End encrypted', loading: false, isDetailsModal: true, }; const { queryByTestId, getByTestId, getByText } = render(<EncryptionStatusIcon {...props} />); getByTestId('encryption-icon'); getByText('End to End encrypted'); expect(queryByTestId('encryption-icon-tooltip')).toBeNull(); }); }); describe('when there is a href', () => { it('should render inside <a> tag and tooltip', () => { const props = { isEncrypted: false, fill: 2, loading: false, text: 'This email adress is invalid', }; const { getByTestId } = render(<EncryptionStatusIcon {...props} />); const tooltip = getByTestId('encryption-icon-tooltip'); // workaround to be able to get by tag const href = within(tooltip).getByText((_, el) => el?.tagName.toLowerCase() === 'a'); within(href).getByText('This email adress is invalid'); within(href).getByTestId('encryption-icon'); }); }); describe('when shouldHaveHref is false', () => { it('should render only inside tooltip', () => { const props = { isEncrypted: false, fill: 2, loading: false, text: 'This email adress is invalid', shouldHaveHref: false, }; const { getByTestId } = render(<EncryptionStatusIcon {...props} />); const tooltip = getByTestId('encryption-icon-tooltip'); within(tooltip).getByText('This email adress is invalid'); within(tooltip).getByTestId('encryption-icon'); expect(within(tooltip).queryByText((_, el) => el?.tagName.toLowerCase() === 'a')).toBeNull(); }); }); }); ```
/content/code_sandbox/applications/mail/src/app/components/message/EncryptionStatusIcon.test.tsx
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
615
```xml <?xml version="1.0" encoding="utf-8"?> <shape xmlns:android="path_to_url"> <solid android:color="@color/colorAccent" /> <!--border color and border width--> <stroke android:width="3dp" android:color="@color/white" /> <!--border radius in dp--> <corners android:radius="30dp" /> </shape> ```
/content/code_sandbox/Android/app/src/main/res/drawable/round_shape.xml
xml
2016-01-30T13:42:30
2024-08-12T19:21:10
Travel-Mate
project-travel-mate/Travel-Mate
1,292
89
```xml // import { ReactLib } from "./react-lib"; import { declareSubApp as dsa, SubAppDef, SubAppOptions, SubAppFeatureFactory, PipelineFactoryParams } from "@xarc/subapp"; import { __createDynamicComponent, CreateComponentOptions } from "../common/create-component"; import { BrowserReactLib } from "./react-lib-browser"; import { __reactFrameworkFeature, __addFeature } from "../common/internal"; import { appContextFeature } from "./feat-app-context-browser"; import { ReactClientRenderPipeline } from "./react-render-pipeline"; // // re-exports // export * from "../common"; export * from "./feat-static-props-browser"; export * from "./subapp-as-component"; export { AppContext } from "../common/app-context"; export { appContextFeature }; /** * Add React framework feature to a subapp (browser version) * * This is added as default if you use `declareSubApp` or `createDynamicComponent` from `@xarc/react` */ export function reactFrameworkFeature(): SubAppFeatureFactory { return __reactFrameworkFeature((...args) => new BrowserReactLib(...args)); } /** * declare a subapp to use React framework (browser version) * * @param options - subapp options */ function __declareSubApp(options: SubAppOptions): SubAppDef { // add framework feature if it's not exist let opts = __addFeature(options, "framework", reactFrameworkFeature); opts = __addFeature(opts, "app-context-provider", appContextFeature); const def = dsa(opts); def._pipelineFactory = function ({ csrData }: PipelineFactoryParams) { return new ReactClientRenderPipeline(csrData); }; return def; } export { __declareSubApp as declareSubApp }; /** * create a dynamic component for the React framework (browser version) * * @param optDef - SubAppOptions or SubAppDef * @param options - create component options * * @returns a React component that will be dynamic import */ export function createDynamicComponent( optDef: SubAppDef | SubAppOptions, options: CreateComponentOptions = {} ) { return __createDynamicComponent(optDef, options, __declareSubApp); } ```
/content/code_sandbox/packages/xarc-react/src/browser/index.tsx
xml
2016-09-06T19:02:39
2024-08-11T11:43:11
electrode
electrode-io/electrode
2,103
479
```xml // Modified version of: path_to_url import electron, { BrowserWindow, Rectangle } from 'electron' import jsonfile from 'jsonfile' import mkdirp from 'mkdirp' import path from 'path' export interface WindowStateOptions { /** The height that should be returned if no file exists yet. Defaults to `600`. */ defaultHeight?: number /** The width that should be returned if no file exists yet. Defaults to `800`. */ defaultWidth?: number /** Should we automatically restore the window to full screen, if it was last closed full screen. Defaults to `true`. */ fullScreen?: boolean /** The path where the state file should be written to. Defaults to `app.getPath('userData')`. */ path?: string /** The name of file. Defaults to `window-state.json`. */ file?: string /** Should we automatically maximize the window, if it was last closed maximized. Defaults to `true`. */ maximize?: boolean } export interface WindowInternalState { displayBounds: { height: number width: number } /** The saved height of loaded state. `defaultHeight` if the state has not been saved yet. */ height: number /** true if the window state was saved while the window was in full screen mode. `undefined` if the state has not been saved yet. */ isFullScreen: boolean /** `true` if the window state was saved while the window was maximized. `undefined` if the state has not been saved yet. */ isMaximized: boolean /** The saved width of loaded state. `defaultWidth` if the state has not been saved yet. */ width: number /** The saved x coordinate of the loaded state. `undefined` if the state has not been saved yet. */ x: number /** The saved y coordinate of the loaded state. `undefined` if the state has not been saved yet. */ y: number } export interface WindowState extends WindowInternalState { /** Register listeners on the given `BrowserWindow` for events that are related to size or position changes (resize, move). It will also restore the window's maximized or full screen state. When the window is closed we automatically remove the listeners and save the state. */ manage: (window: BrowserWindow) => void /** Removes all listeners of the managed `BrowserWindow` in case it does not need to be managed anymore. */ unmanage: () => void } export function windowStateKeeper(options: WindowStateOptions): WindowState { const app = electron.app || electron.remote.app const screen = electron.screen || electron.remote.screen let state: WindowInternalState let winRef: BrowserWindow | null = null let updateStateTimer: number let saveStateTimer: number const updateStateDelay = 100 const saveStateDelay = 500 const config = Object.assign( { file: 'window-state.json', path: app.getPath('userData'), maximize: true, fullScreen: true, }, options, ) const fullStoreFileName = path.join(config.path, config.file) function isNormal(win: BrowserWindow) { return !win.isMaximized() && !win.isMinimized() && !win.isFullScreen() } function hasBounds() { return ( state && Number.isInteger(state.x) && Number.isInteger(state.y) && Number.isInteger(state.width) && state.width > 0 && Number.isInteger(state.height) && state.height > 0 ) } function resetStateToDefault() { const displayBounds = screen.getPrimaryDisplay().bounds // Reset state to default values on the primary display state = { displayBounds, x: 0, y: 0, width: config.defaultWidth || 800, height: config.defaultHeight || 600, isFullScreen: false, isMaximized: false, } } function windowWithinBounds(bounds: Rectangle) { return ( state.x >= bounds.x && state.y >= bounds.y && state.x + state.width <= bounds.x + bounds.width && state.y + state.height <= bounds.y + bounds.height ) } function ensureWindowVisibleOnSomeDisplay() { const visible = screen.getAllDisplays().some((display) => { return windowWithinBounds(display.bounds) }) if (!visible) { // Window is partially or fully not visible now. // Reset it to safe defaults. return resetStateToDefault() } } function validateState() { const isValid = state && (hasBounds() || state.isMaximized || state.isFullScreen) if (!isValid) { resetStateToDefault() return } if (hasBounds() && state.displayBounds) { ensureWindowVisibleOnSomeDisplay() } } function updateState(_win?: BrowserWindow) { const win = _win || winRef if (!win) { return } // Don't throw an error when window was closed try { const winBounds = win.getBounds() if (isNormal(win)) { state.x = winBounds.x state.y = winBounds.y state.width = winBounds.width state.height = winBounds.height } state.isMaximized = win.isMaximized() state.isFullScreen = win.isFullScreen() state.displayBounds = screen.getDisplayMatching(winBounds).bounds } catch (err) { // } } function saveState(win?: BrowserWindow) { // Update window state only if it was provided if (win) { updateState(win) } // Save state try { mkdirp.sync(path.dirname(fullStoreFileName)) jsonfile.writeFileSync(fullStoreFileName, state) } catch (err) { // } } function stateChangeHandler() { // Handles both 'resize' and 'move' clearTimeout(updateStateTimer) clearTimeout(saveStateTimer) updateStateTimer = setTimeout(updateState, updateStateDelay) saveStateTimer = setTimeout(saveState, saveStateDelay) } function closeHandler() { updateState() } function closedHandler() { // Unregister listeners and save state unmanage() saveState() } function manage(win: BrowserWindow) { winRef = win if (config.maximize && state.isMaximized) { win.maximize() } if (config.fullScreen && state.isFullScreen) { win.setFullScreen(true) } win.on('resize', stateChangeHandler) win.on('move', stateChangeHandler) win.on('close', closeHandler) win.on('closed', closedHandler) } function unmanage() { if (winRef) { clearTimeout(updateStateTimer) winRef.removeListener('resize', stateChangeHandler) winRef.removeListener('move', stateChangeHandler) winRef.removeListener('close', closeHandler) winRef.removeListener('closed', closedHandler) winRef = null } } // Load previous state try { state = jsonfile.readFileSync(fullStoreFileName) } catch (err) { // } // Check state validity validateState() // Set state fallback values state = Object.assign( { width: config.defaultWidth || 800, height: config.defaultHeight || 600, }, state!, ) return { get x() { return state.x }, get y() { return state.y }, get width() { return state.width }, get height() { return state.height }, get displayBounds() { return state.displayBounds }, get isMaximized() { return state.isMaximized }, get isFullScreen() { return state.isFullScreen }, manage, unmanage, } } ```
/content/code_sandbox/packages/desktop/src/libs/electron-window-state/index.ts
xml
2016-11-30T23:24:21
2024-08-16T00:24:59
devhub
devhubapp/devhub
9,652
1,728
```xml <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url"> <plist version="1.0"> <dict> <key>SchemeUserState</key> <dict> <key>Cycript-Reveal.xcscheme</key> <dict> <key>orderHint</key> <integer>0</integer> </dict> </dict> <key>SuppressBuildableAutocreation</key> <dict> <key>BBDBFFF41D2EF8B60096EB26</key> <dict> <key>primary</key> <true/> </dict> </dict> </dict> </plist> ```
/content/code_sandbox/Cycript-Reveal/Cycript-Reveal.xcodeproj/xcuserdata/eular.xcuserdatad/xcschemes/xcschememanagement.plist
xml
2016-06-14T12:50:00
2024-08-16T17:14:23
iOSAppHook
Urinx/iOSAppHook
2,364
182
```xml import { CdsTextarea as Textarea } from '@cds/core/textarea'; import '@cds/core/textarea/register'; import { createComponent } from '@lit-labs/react'; import * as React from 'react'; import { logReactVersion } from '../utils/index.js'; export const CdsTextarea = createComponent(React, 'cds-textarea', Textarea, {}, 'CdsTextarea'); logReactVersion(React); ```
/content/code_sandbox/packages/react/src/textarea/index.tsx
xml
2016-09-29T17:24:17
2024-08-11T17:06:15
clarity
vmware-archive/clarity
6,431
91
```xml import React from 'react' export function Hello() { return <>Hello</> } ```
/content/code_sandbox/test/integration/typescript-paths/components/hello.tsx
xml
2016-10-05T23:32:51
2024-08-16T19:44:30
next.js
vercel/next.js
124,056
19
```xml import * as React from 'react'; import { ThemeProvider, DefaultButton, PartialTheme, getTheme } from '@fluentui/react'; import { useBoolean } from '@fluentui/react-hooks'; import { ContextualMenuExample } from './components'; // This app is here as a simple sandbox to render v8 controls inside of an React 18 environment. export const App = () => { const { palette } = getTheme(); const lightTheme: PartialTheme = { semanticColors: { bodyBackground: palette.white, bodyText: palette.black, menuBackground: palette.white, }, }; const darkTheme: PartialTheme = { semanticColors: { bodyBackground: palette.black, bodyText: palette.white, menuBackground: palette.black, }, }; const [isLight, { toggle: toggleIsLight }] = useBoolean(true); const ToggleButton: React.FunctionComponent = () => { // eslint-disable-next-line @typescript-eslint/ban-ts-comment // @ts-ignore typing error caused by monorepo being on @types/react version 17 and this app being on react 18. // Seems to be caused by certain v8 components (like Button) still being class components. // Error goes away when monorepo is migrated to react 18 types OR when @fluentui/react increases peer dependency // range to include react 18. return <DefaultButton onClick={toggleIsLight}>Toggle theme</DefaultButton>; }; return ( <ThemeProvider style={{ padding: '8px' }} theme={isLight ? lightTheme : darkTheme}> <ToggleButton /> <ContextualMenuExample /> </ThemeProvider> ); }; ```
/content/code_sandbox/apps/react-18-tests-v8/src/App.tsx
xml
2016-06-06T15:03:44
2024-08-16T18:49:29
fluentui
microsoft/fluentui
18,221
362
```xml import { ChangeDetectionStrategy, ChangeDetectorRef, Component, OnDestroy, OnInit } from '@angular/core'; import { ActivatedRoute, Router } from '@angular/router'; import { TranslateService } from '@ngx-translate/core'; import { Subscription } from 'rxjs'; import { finalize } from 'rxjs/operators'; import { Action } from 'app/model/action.model'; import { Group } from 'app/model/group.model'; import { Job } from 'app/model/job.model'; import { Pipeline } from 'app/model/pipeline.model'; import { Stage } from 'app/model/stage.model'; import { ActionService } from 'app/service/action/action.service'; import { GroupService } from 'app/service/group/group.service'; import { PipelineService } from 'app/service/pipeline/pipeline.service'; import { PathItem } from 'app/shared/breadcrumb/breadcrumb.component'; import { AutoUnsubscribe } from 'app/shared/decorator/autoUnsubscribe'; import { ToastService } from 'app/shared/toast/ToastService'; @Component({ selector: 'app-action-add', templateUrl: './action.add.html', styleUrls: ['./action.add.scss'], changeDetection: ChangeDetectionStrategy.OnPush }) @AutoUnsubscribe() export class ActionAddComponent implements OnInit, OnDestroy { action: Action; groups: Array<Group>; loading: boolean; path: Array<PathItem>; queryParamsSub: Subscription; projectKey: string; pipeline: Pipeline; stage: Stage; job: Job; constructor( private _actionService: ActionService, private _pipelineService: PipelineService, private _toast: ToastService, private _translate: TranslateService, private _router: Router, private _groupService: GroupService, private _route: ActivatedRoute, private _cd: ChangeDetectorRef ) { this.action = <Action>{ editable: true }; this.getGroups(); this.path = [<PathItem>{ translate: 'common_settings' }, <PathItem>{ translate: 'action_list_title', routerLink: ['/', 'settings', 'action'] }, <PathItem>{ translate: 'common_create' }]; } ngOnDestroy(): void {} // Should be set to use @AutoUnsubscribe with AOT ngOnInit() { this.queryParamsSub = this._route.queryParams.subscribe(params => { if (params['from']) { let path = params['from'].split('/'); if (path.length === 4) { this.initFromJob(path[0], path[1], Number(path[2]), path[3]); } this._cd.markForCheck(); } }); } initFromJob(projectKey: string, pipelineName: string, stageID: number, jobName: string) { this.projectKey = projectKey; this._pipelineService.getPipeline(projectKey, pipelineName) .pipe(finalize(() => this._cd.markForCheck())) .subscribe(p => { this.pipeline = p; this.stage = this.pipeline.stages.find((s: Stage) => s.id === stageID); if (this.stage) { this.job = this.stage.jobs.find((j: Job) => j.action.name === jobName); if (this.job) { this.action = <Action>{ editable: true, description: this.job.action.description, requirements: this.job.action.requirements, actions: this.job.action.actions }; } } }); } getGroups() { this.loading = true; this._groupService.getAll() .pipe(finalize(() => { this.loading = false; this._cd.markForCheck(); })) .subscribe(gs => { this.groups = gs; }); } actionSave(action: Action): void { this.action.loading = true; if (action.actions) { action.actions.forEach(a => { if (a.parameters) { a.parameters.forEach(p => { if (p.type === 'boolean' && !p.value) { p.value = 'false'; } p.value = p.value.toString(); }); } }); } if (action.parameters) { action.parameters.forEach(p => { if (p.type === 'boolean' && !p.value) { p.value = 'false'; } p.value = p.value.toString(); }); } this._actionService.add(action) .pipe(finalize(() => this._cd.markForCheck())) .subscribe(a => { this._toast.success('', this._translate.instant('action_saved')); // navigate to have action name in url this._router.navigate(['settings', 'action', a.group.name, a.name]); }, () => { this.action.loading = false; }); } } ```
/content/code_sandbox/ui/src/app/views/settings/action/add/action.add.component.ts
xml
2016-10-11T08:28:23
2024-08-16T01:55:31
cds
ovh/cds
4,535
1,011
```xml import typeDefs from './graphql/typeDefs'; import resolvers from './graphql/resolvers'; import * as permissions from './permissions'; import { generateModels } from './connectionResolver'; import { setupMessageConsumers } from './messageBroker'; import { getSubdomain } from '@erxes/api-utils/src/core'; export let debug: any; export let graphqlPubsub: any; export let mainDb: any; export default { name: 'salesplans', permissions, graphql: async () => { return { typeDefs: await typeDefs(), resolvers, }; }, apolloServerContext: async (context: any, req: any) => { const subdomain = getSubdomain(req); context.subdomain = subdomain; context.models = await generateModels(subdomain); return context; }, onServerInit: async (options: any) => {}, setupMessageConsumers, meta: { permissions, }, }; ```
/content/code_sandbox/packages/plugin-salesplans-api/src/configs.ts
xml
2016-11-11T06:54:50
2024-08-16T10:26:06
erxes
erxes/erxes
3,479
205
```xml import { NgModule } from '@angular/core'; import { RouterModule, ROUTES, Routes } from '@angular/router'; import { marker as gettext } from '@ngneat/transloco-keys-manager/marker'; import { NavigationPageComponent } from '~/app/core/pages/navigation-page/navigation-page.component'; import { RouteConfigService } from '~/app/core/services/route-config.service'; import { NfsSettingsFormPageComponent } from '~/app/pages/services/nfs/nfs-settings-form-page.component'; import { NfsShareDatatablePageComponent } from '~/app/pages/services/nfs/nfs-share-datatable-page.component'; import { NfsShareFormPageComponent } from '~/app/pages/services/nfs/nfs-share-form-page.component'; import { RsyncModuleDatatablePageComponent } from '~/app/pages/services/rsync/rsync-module-datatable-page.component'; import { RsyncModuleFormPageComponent } from '~/app/pages/services/rsync/rsync-module-form-page.component'; import { RsyncModuleSettingsFormPageComponent } from '~/app/pages/services/rsync/rsync-module-settings-form-page.component'; import { RsyncTaskDatatablePageComponent } from '~/app/pages/services/rsync/rsync-task-datatable-page.component'; import { RsyncTaskFormPageComponent } from '~/app/pages/services/rsync/rsync-task-form-page.component'; import { SmbSettingsFormPageComponent } from '~/app/pages/services/smb/smb-settings-form-page.component'; import { SmbShareDatatablePageComponent } from '~/app/pages/services/smb/smb-share-datatable-page.component'; import { SmbShareFormPageComponent } from '~/app/pages/services/smb/smb-share-form-page.component'; import { SshFormPageComponent } from '~/app/pages/services/ssh/ssh-form-page.component'; import { IsDirtyGuardService } from '~/app/shared/services/is-dirty-guard.service'; const routes: Routes = [ { path: '', component: NavigationPageComponent }, { path: 'ssh', component: SshFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('SSH'), editing: true, notificationTitle: gettext('Updated SSH settings.') } }, { path: 'rsync', data: { title: gettext('Rsync') }, children: [ { path: '', component: NavigationPageComponent }, { path: 'tasks', data: { title: gettext('Tasks') }, children: [ { path: '', component: RsyncTaskDatatablePageComponent }, { path: 'create', component: RsyncTaskFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Create'), editing: false, notificationTitle: gettext('Created Rsync task.') } }, { path: 'edit/:uuid', component: RsyncTaskFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Edit'), editing: true, notificationTitle: gettext('Updated Rsync task.') } } ] }, { path: 'server', data: { title: gettext('Server') }, children: [ { path: '', component: NavigationPageComponent }, { path: 'settings', component: RsyncModuleSettingsFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Settings'), editing: true, notificationTitle: gettext('Updated Rsync Server settings.') } }, { path: 'modules', data: { title: gettext('Modules') }, children: [ { path: '', component: RsyncModuleDatatablePageComponent }, { path: 'create', component: RsyncModuleFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Create'), editing: false, notificationTitle: gettext('Created Rsync server module "{{ name }}".') } }, { path: 'edit/:uuid', component: RsyncModuleFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Edit'), editing: true, notificationTitle: gettext('Updated Rsync server module "{{ name }}".') } } ] } ] } ] }, { path: 'smb', data: { title: gettext('SMB/CIFS') }, children: [ { path: '', component: NavigationPageComponent }, { path: 'settings', component: SmbSettingsFormPageComponent, data: { title: gettext('Settings'), editing: true, notificationTitle: gettext('Updated SMB/CIFS settings.') } }, { path: 'shares', data: { title: gettext('Shares') }, children: [ { path: '', component: SmbShareDatatablePageComponent }, { path: 'create', component: SmbShareFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Create'), editing: false, notificationTitle: gettext('Created SMB/CIFS share.') } }, { path: 'edit/:uuid', component: SmbShareFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Edit'), editing: true, notificationTitle: gettext('Updated SMB/CIFS share.') } } ] } ] }, { path: 'nfs', data: { title: gettext('NFS') }, children: [ { path: '', component: NavigationPageComponent }, { path: 'settings', component: NfsSettingsFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Settings'), editing: true, notificationTitle: gettext('Updated NFS settings.') } }, { path: 'shares', data: { title: gettext('Shares') }, children: [ { path: '', component: NfsShareDatatablePageComponent }, { path: 'create', component: NfsShareFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Create'), editing: false, notificationTitle: gettext('Created NFS share.') } }, { path: 'edit/:uuid', component: NfsShareFormPageComponent, canDeactivate: [IsDirtyGuardService], data: { title: gettext('Edit'), editing: true, notificationTitle: gettext('Updated NFS share.') } } ] } ] } ]; @NgModule({ exports: [RouterModule], imports: [RouterModule.forChild(routes)], providers: [ { provide: ROUTES, multi: true, useFactory: (routeConfigService: RouteConfigService): Routes => { routeConfigService.inject('services', routes); return routes; }, deps: [RouteConfigService] } ] }) export class ServicesRoutingModule {} ```
/content/code_sandbox/deb/openmediavault/workbench/src/app/pages/services/services-routing.module.ts
xml
2016-05-03T10:35:34
2024-08-16T08:03:04
openmediavault
openmediavault/openmediavault
4,954
1,538
```xml import { Entity, PrimaryGeneratedColumn, Column, OneToMany, OneToOne, JoinColumn, } from "../../../../src" import { Photo } from "./Photo" import { Profile } from "./Profile" @Entity() export class User { @PrimaryGeneratedColumn() id: number @Column() name: string @OneToMany("Photo", "user") photos: Photo[] @OneToOne("Profile") @JoinColumn() profile: Profile } ```
/content/code_sandbox/test/github-issues/4190/entity/User.ts
xml
2016-02-29T07:41:14
2024-08-16T18:28:52
typeorm
typeorm/typeorm
33,875
105
```xml import { DefaultTheme, DarkTheme } from '@fluentui/theme-samples'; import { Fluent2WebLightTheme, Fluent2WebDarkTheme } from '@fluentui/fluent2-theme'; import { IAppThemes, IExampleCardTheme } from '@fluentui/react-docsite-components'; const exampleCardTheme: IExampleCardTheme[] = [ { title: 'Default', theme: DefaultTheme }, { title: 'Dark', theme: DarkTheme }, { title: 'Fluent 2 Web Light', theme: Fluent2WebLightTheme }, { title: 'Fluent 2 Web Dark', theme: Fluent2WebDarkTheme }, ]; export const AppThemes: IAppThemes = { exampleCardTheme, hideSchemes: true, }; ```
/content/code_sandbox/apps/public-docsite/src/components/Site/AppThemes.ts
xml
2016-06-06T15:03:44
2024-08-16T18:49:29
fluentui
microsoft/fluentui
18,221
163
```xml export const findUpwards = (target: HTMLElement, outOfBoundsElement: HTMLElement, cb: (el: HTMLElement) => boolean) => { let current: HTMLElement | null = target; do { if (!current) { return; } if (cb(current)) { return current; } if (current === outOfBoundsElement) { return; } current = current.parentElement; // eslint-disable-next-line no-constant-condition } while (true); }; export const findContainingParent = (container: HTMLElement | ChildNode, target: HTMLElement) => { for (let i = 0; i < container.childNodes.length; ++i) { const node = container.childNodes[i]; if (node.contains(target)) { return i; } } return -1; }; export const blockClick = () => { let cancel: () => void; const block = (e: MouseEvent) => { e.stopPropagation(); e.preventDefault(); cancel(); }; let done = false; const handleMouseUp = () => { if (done) { return; } done = true; setTimeout(() => { cancel(); }, 1); }; document.addEventListener('mouseup', handleMouseUp, true); document.addEventListener('click', block, true); cancel = () => { document.removeEventListener('mouseup', handleMouseUp, true); document.removeEventListener('click', block, true); }; return cancel; }; export const createAutoScroll = (container: HTMLElement, { marginTop = 5, marginBottom = 5, speed = 5 } = {}) => { const rect = container.getBoundingClientRect(); let stopScrolling: (() => void) | undefined; const startScrolling = (direction: 1 | -1) => { let stop = false; const cb = () => { if (stop) { return; } const pre = container.scrollTop; container.scrollTop = pre + direction * speed; if (container.scrollTop === pre) { return; } requestAnimationFrame(cb); }; cb(); return () => { stop = true; }; }; const onMouseMove = ({ pageY }: MouseEvent) => { if (pageY <= rect.top + marginTop) { if (!stopScrolling) { stopScrolling = startScrolling(-1); } return; } if (pageY >= rect.bottom - marginBottom) { if (!stopScrolling) { stopScrolling = startScrolling(+1); } return; } if (stopScrolling) { stopScrolling(); stopScrolling = undefined; } }; const onMouseUp = () => { if (stopScrolling) { stopScrolling(); stopScrolling = undefined; } }; return { onMouseMove, onMouseUp, }; }; export const createRafUpdater = () => { let last: (() => void) | undefined; const run = () => { if (last) { last(); last = undefined; } }; return (cb: () => void) => { const prevLast = last; last = cb; // If the prev raf has not been consumed, schedule it to run if (!prevLast) { requestAnimationFrame(run); } }; }; ```
/content/code_sandbox/applications/calendar/src/app/components/calendar/mouseHelpers/domHelpers.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
729
```xml import { useEffect, useContext, useMemo, useState, useCallback, useRef, } from "react"; import { AppStateContext } from "../State/AppStateContext"; import { KioskState } from "../Types"; const Background = () => { const { state: kiosk } = useContext(AppStateContext); const [myRef, setMyRef] = useState<HTMLElement | null>(null); const canvas = useRef<HTMLCanvasElement>(document.createElement("canvas")); const image = useRef<HTMLImageElement>(document.createElement("img")); const timer = useRef<NodeJS.Timeout | null>(null); // TODO: Store cached background URLs in local storage instead of in memory. const dataUrlCache = useRef<Map<string, string>>(new Map()); const selectedGame = useMemo( () => kiosk.allGames.find(g => g.id === kiosk.selectedGameId), [kiosk.selectedGameId] ); const handleRef = useCallback((node: HTMLElement | null) => { setMyRef(node); }, []); useEffect(() => { // debounce so we don't update when continuously scrolling games if (timer.current) { clearTimeout(timer.current); } if (kiosk.kioskState === KioskState.PlayingGame) { if (myRef) { myRef.style.backgroundImage = ""; } return; } timer.current = setTimeout(() => { if (selectedGame && kiosk.kioskState !== KioskState.PlayingGame) { if (dataUrlCache.current.has(selectedGame.id)) { if (myRef) { myRef.style.backgroundImage = `url(${dataUrlCache.current.get( selectedGame.id )})`; } return; } image.current.crossOrigin = "anonymous"; image.current.src = `path_to_url{selectedGame.id}/thumb`; image.current.onload = () => { canvas.current.width = 80; canvas.current.height = 60; const ctx = canvas.current.getContext("2d"); if (ctx) { // TODO: Apply blur and opacity filters to image here, not in CSS ctx.drawImage( image.current, 0, 0, image.current.width, image.current.height, 0, 0, canvas.current.width, canvas.current.height ); const url = canvas.current.toDataURL("image/png"); if (myRef) { dataUrlCache.current.set(selectedGame.id, url); myRef.style.backgroundImage = `url(${url})`; } } }; } else { if (myRef) { myRef.style.backgroundImage = ""; } } }, 750); }, [selectedGame, kiosk.kioskState, myRef]); const className = useMemo(() => { if (kiosk.kioskState === KioskState.PlayingGame) { return "background-flat"; } else { return "background-acrylic"; } }, [kiosk.kioskState]); return <div className={className} ref={handleRef} />; }; export default Background; ```
/content/code_sandbox/kiosk/src/Components/Background.tsx
xml
2016-01-24T19:35:52
2024-08-16T16:39:39
pxt
microsoft/pxt
2,069
664
```xml 'use client'; import { RouterFactory, StackRouter, useNavigationBuilder } from '@react-navigation/native'; import * as React from 'react'; import { SafeAreaView } from 'react-native-safe-area-context'; import { Screen } from './Screen'; import { useContextKey } from '../Route'; import { useFilterScreenChildren } from '../layouts/withLayoutContext'; import { useSortedScreens } from '../useScreens'; type NavigatorTypes = ReturnType<typeof useNavigationBuilder>; // TODO: This might already exist upstream, maybe something like `useCurrentRender` ? export const NavigatorContext = React.createContext<{ contextKey: string; state: NavigatorTypes['state']; navigation: NavigatorTypes['navigation']; descriptors: NavigatorTypes['descriptors']; router: RouterFactory<any, any, any>; } | null>(null); if (process.env.NODE_ENV !== 'production') { NavigatorContext.displayName = 'NavigatorContext'; } export type NavigatorProps = { initialRouteName?: Parameters<typeof useNavigationBuilder>[1]['initialRouteName']; screenOptions?: Parameters<typeof useNavigationBuilder>[1]['screenOptions']; children?: Parameters<typeof useNavigationBuilder>[1]['children']; router?: Parameters<typeof useNavigationBuilder>[0]; }; /** An unstyled custom navigator. Good for basic web layouts */ export function Navigator({ initialRouteName, screenOptions, children, router }: NavigatorProps) { const contextKey = useContextKey(); // Allows adding Screen components as children to configure routes. const { screens, children: otherSlot } = useFilterScreenChildren(children, { isCustomNavigator: true, contextKey, }); const sorted = useSortedScreens(screens ?? []); if (!sorted.length) { console.warn(`Navigator at "${contextKey}" has no children.`); return null; } return ( <QualifiedNavigator initialRouteName={initialRouteName} screenOptions={screenOptions} screens={sorted} contextKey={contextKey} router={router}> {otherSlot} </QualifiedNavigator> ); } function QualifiedNavigator({ initialRouteName, screenOptions, children, screens, contextKey, router = StackRouter, }: NavigatorProps & { contextKey: string; screens: React.ReactNode[] }) { const { state, navigation, descriptors, NavigationContent } = useNavigationBuilder(router, { // Used for getting the parent with navigation.getParent('/normalized/path') id: contextKey, children: screens, screenOptions, initialRouteName, }); return ( <NavigatorContext.Provider value={{ contextKey, state, navigation, descriptors, router, }}> <NavigationContent>{children}</NavigationContent> </NavigatorContext.Provider> ); } export function useNavigatorContext() { const context = React.useContext(NavigatorContext); if (!context) { throw new Error('useNavigatorContext must be used within a <Navigator />'); } return context; } export function useSlot() { const context = useNavigatorContext(); const { state, descriptors } = context; const current = state.routes.find((route, i) => { return state.index === i; }); if (!current) { return null; } return descriptors[current.key]?.render() ?? null; } /** Renders the currently selected content. */ export function Slot(props: Omit<NavigatorProps, 'children'>) { const contextKey = useContextKey(); const context = React.useContext(NavigatorContext); // Ensure the context is for the current contextKey if (context?.contextKey !== contextKey) { // Qualify the content and re-export. return ( <Navigator {...props}> <QualifiedSlot /> </Navigator> ); } return <QualifiedSlot />; } export function QualifiedSlot() { return useSlot(); } export function DefaultNavigator() { return ( <SafeAreaView style={{ flex: 1 }}> <Navigator> <QualifiedSlot /> </Navigator> </SafeAreaView> ); } Navigator.Slot = Slot; Navigator.useContext = useNavigatorContext; /** Used to configure route settings. */ Navigator.Screen = Screen; ```
/content/code_sandbox/packages/expo-router/src/views/Navigator.tsx
xml
2016-08-15T17:14:25
2024-08-16T19:54:44
expo
expo/expo
32,004
885
```xml import { createHash } from 'crypto'; import { getCssModulesLocalIdent as getIdentByRust } from '@ice/bundles'; export default function getCSSModuleLocalIdent(filename: string, localName: string, localIdentName: string): string { // path_to_url#localidentname if (localIdentName) { return getIdentByRust(filename, localName, localIdentName); } const hash = createHash('md5'); hash.update(Buffer.from(filename + localName, 'utf8')); const localIdentHash = hash.digest('base64') // Remove all leading digits .replace(/^\d+/, '') // Replace all slashes with underscores (same as in base64url) .replace(/\//g, '_') // Remove everything that is not an alphanumeric or underscore .replace(/[^A-Za-z0-9_]+/g, '') .slice(0, 8); return `${localName}--${localIdentHash}`; } ```
/content/code_sandbox/packages/shared-config/src/getCSSModuleLocalIdent.ts
xml
2016-11-03T06:59:15
2024-08-16T10:11:29
ice
alibaba/ice
17,815
217
```xml import { runtime } from 'webextension-polyfill' import { Readability } from '@mozilla/readability' import { RuntimeMessage, RuntimeMessageTypes } from '../types/message' let isSelectingNodeForClipping = false let isScreenshotMode = false runtime.onMessage.addListener(async (message: RuntimeMessage) => { switch (message.type) { case RuntimeMessageTypes.StartNodeSelection: { isSelectingNodeForClipping = true return } case RuntimeMessageTypes.ToggleScreenshotMode: { isScreenshotMode = message.enabled return } case RuntimeMessageTypes.HasSelection: { const selection = window.getSelection() if (!selection) { return false } if (selection.rangeCount < 1) { return false } const range = selection.getRangeAt(0) return !range.collapsed } case RuntimeMessageTypes.GetSelection: { const selection = window.getSelection() if (!selection || selection.rangeCount < 1) { return } const range = selection.getRangeAt(0) const result = document.createElement('div') result.appendChild(range.cloneContents()) return { title: document.title, content: result.innerHTML, url: window.location.href } } case RuntimeMessageTypes.GetFullPage: { if (isScreenshotMode) { const content = await runtime.sendMessage({ type: RuntimeMessageTypes.CaptureVisibleTab, }) return { title: document.title, content: content, url: window.location.href, isScreenshot: true } } return { title: document.title, content: document.body.innerHTML, url: window.location.href } } case RuntimeMessageTypes.GetArticle: { const documentClone = document.cloneNode(true) as Document const article = new Readability(documentClone).parse() if (!article) { return } return { title: article.title, content: article.content, url: window.location.href } } default: return } }) const nodeOverlayElement = document.createElement('div') nodeOverlayElement.style.border = '2px solid #086dd6' nodeOverlayElement.style.position = 'fixed' nodeOverlayElement.style.top = '0' nodeOverlayElement.style.left = '0' nodeOverlayElement.style.zIndex = '69420' nodeOverlayElement.style.width = window.innerWidth + 'px' nodeOverlayElement.style.height = window.innerHeight - 4 + 'px' nodeOverlayElement.style.pointerEvents = 'none' nodeOverlayElement.style.visibility = 'hidden' nodeOverlayElement.id = 'sn-clipper-node-overlay' document.body.appendChild(nodeOverlayElement) window.addEventListener('mousemove', (event) => { if (!isSelectingNodeForClipping) { nodeOverlayElement.style.visibility = 'hidden' return } nodeOverlayElement.style.visibility = '' const { target } = event if (!target || !(target instanceof HTMLElement)) { return } const targetRect = target.getBoundingClientRect() nodeOverlayElement.style.width = targetRect.width + 'px' nodeOverlayElement.style.height = targetRect.height + 'px' nodeOverlayElement.style.transform = `translate3d(${targetRect.x}px, ${targetRect.y}px, 0)` }) const disableNodeSelection = () => { isSelectingNodeForClipping = false nodeOverlayElement.style.visibility = 'hidden' } const imageFromBase64 = (base64: string) => { return new Promise<HTMLImageElement>((resolve, reject) => { const image = new Image() image.onload = () => { resolve(image) } image.onerror = reject image.src = base64 }) } const toPng = async (element: HTMLElement) => { const visibleTab: string = await runtime.sendMessage({ type: RuntimeMessageTypes.CaptureVisibleTab, }) const image = await imageFromBase64(visibleTab) const canvas = document.createElement('canvas') canvas.width = image.width canvas.height = image.height const context = canvas.getContext('2d') if (!context) { throw new Error('Could not get canvas context') } context.drawImage(image, 0, 0) const elementRect = element.getBoundingClientRect() const x = elementRect.x const y = elementRect.y const width = elementRect.width const height = elementRect.height const imageData = context.getImageData(x, y, width, height) canvas.width = width canvas.height = height context.putImageData(imageData, 0, 0) return canvas.toDataURL('image/png') } window.addEventListener('click', async (event) => { if (!isSelectingNodeForClipping) { return } disableNodeSelection() event.preventDefault() event.stopPropagation() const { target } = event if (!target || !(target instanceof HTMLElement)) { return } const title = document.title const content = isScreenshotMode ? await toPng(target) : target.outerHTML void runtime.sendMessage({ type: RuntimeMessageTypes.OpenPopupWithSelection, payload: { title, content, url: window.location.href, isScreenshot: isScreenshotMode }, } as RuntimeMessage) }) window.addEventListener('keydown', (event) => { if (!isSelectingNodeForClipping) { return } if (event.key === 'Escape') { disableNodeSelection() } }) ```
/content/code_sandbox/packages/clipper/src/content/content.ts
xml
2016-12-05T23:31:33
2024-08-16T06:51:19
app
standardnotes/app
5,180
1,170
```xml import React from 'react'; import { Button, Panel, PanelGroup, Table, Grid, Row, Col, Placeholder, Stack, ButtonGroup } from 'rsuite'; import DefaultPage from '@/components/Page'; import ImportGuide from '@/components/ImportGuide'; const inDocsComponents = { 'import-guide': () => <ImportGuide components={['Panel', 'PanelGroup']} /> }; export default function Page() { return ( <DefaultPage inDocsComponents={inDocsComponents} dependencies={{ Table, PanelGroup, Panel, Stack, ButtonGroup, Button, Grid, Row, Col, Placeholder }} /> ); } ```
/content/code_sandbox/docs/pages/components/panel/index.tsx
xml
2016-06-06T02:27:46
2024-08-16T16:41:54
rsuite
rsuite/rsuite
8,263
156
```xml import { AfterViewInit, Directive, ElementRef, EventEmitter, HostListener, Input, NgZone, OnDestroy, Output, Renderer2 } from '@angular/core'; import { TreeDraggedElement } from '../models/tree-dragged-element.model'; const DRAG_OVER_CLASS = 'is-dragging-over'; const DRAG_DISABLED_CLASS = 'is-dragging-over-disabled'; @Directive({ selector: '[treeDrop]' }) export class TreeDropDirective implements AfterViewInit, OnDestroy { @Input() allowDragoverStyling = true; @Output('treeDrop') onDropCallback = new EventEmitter(); @Output('treeDropDragOver') onDragOverCallback = new EventEmitter(); @Output('treeDropDragLeave') onDragLeaveCallback = new EventEmitter(); @Output('treeDropDragEnter') onDragEnterCallback = new EventEmitter(); private readonly dragOverEventHandler: (ev: DragEvent) => void; private readonly dragEnterEventHandler: (ev: DragEvent) => void; private readonly dragLeaveEventHandler: (ev: DragEvent) => void; private _allowDrop = (element, $event) => true; @Input() set treeAllowDrop(allowDrop) { if (allowDrop instanceof Function) { this._allowDrop = allowDrop; } else this._allowDrop = (element, $event) => allowDrop; } allowDrop($event) { return this._allowDrop(this.treeDraggedElement.get(), $event); } constructor(private el: ElementRef, private renderer: Renderer2, private treeDraggedElement: TreeDraggedElement, private ngZone: NgZone) { this.dragOverEventHandler = this.onDragOver.bind(this); this.dragEnterEventHandler = this.onDragEnter.bind(this); this.dragLeaveEventHandler = this.onDragLeave.bind(this); } ngAfterViewInit() { let el: HTMLElement = this.el.nativeElement; this.ngZone.runOutsideAngular(() => { el.addEventListener('dragover', this.dragOverEventHandler); el.addEventListener('dragenter', this.dragEnterEventHandler); el.addEventListener('dragleave', this.dragLeaveEventHandler); }); } ngOnDestroy() { let el: HTMLElement = this.el.nativeElement; el.removeEventListener('dragover', this.dragOverEventHandler); el.removeEventListener('dragenter', this.dragEnterEventHandler); el.removeEventListener('dragleave', this.dragLeaveEventHandler); } onDragOver($event) { if (!this.allowDrop($event)) { if (this.allowDragoverStyling) { return this.addDisabledClass(); } return; } this.onDragOverCallback.emit({event: $event, element: this.treeDraggedElement.get()}); $event.preventDefault(); if (this.allowDragoverStyling) { this.addClass(); } } onDragEnter($event) { if (!this.allowDrop($event)) return; $event.preventDefault(); this.onDragEnterCallback.emit({event: $event, element: this.treeDraggedElement.get()}); } onDragLeave($event) { if (!this.allowDrop($event)) { if (this.allowDragoverStyling) { return this.removeDisabledClass(); } return; } this.onDragLeaveCallback.emit({event: $event, element: this.treeDraggedElement.get()}); if (this.allowDragoverStyling) { this.removeClass(); } } @HostListener('drop', ['$event']) onDrop($event) { if (!this.allowDrop($event)) return; $event.preventDefault(); this.onDropCallback.emit({event: $event, element: this.treeDraggedElement.get()}); if (this.allowDragoverStyling) { this.removeClass(); } this.treeDraggedElement.set(null); } private addClass() { this.renderer.addClass(this.el.nativeElement, DRAG_OVER_CLASS); } private removeClass() { this.renderer.removeClass(this.el.nativeElement, DRAG_OVER_CLASS); } private addDisabledClass() { this.renderer.addClass(this.el.nativeElement, DRAG_DISABLED_CLASS); } private removeDisabledClass() { this.renderer.removeClass(this.el.nativeElement, DRAG_DISABLED_CLASS); } } ```
/content/code_sandbox/projects/angular-tree-component/src/lib/directives/tree-drop.directive.ts
xml
2016-03-10T21:29:15
2024-08-15T07:07:30
angular-tree-component
CirclonGroup/angular-tree-component
1,093
909
```xml import { defineConfig } from 'cypress' import vitePreprocessor from 'cypress-vite' import axios from 'axios' export default defineConfig({ fixturesFolder: 'tests/e2e/fixtures', screenshotsFolder: 'tests/e2e/screenshots', videosFolder: 'tests/e2e/videos', downloadsFolder: 'tests/e2e/downloads', e2e: { baseUrl: 'path_to_url // We've imported your old cypress plugins here. // You may want to clean this up later by importing these. setupNodeEvents (on) { on('task', { async 'db:reset' () { await axios.get('path_to_url return true }, }) on('file:preprocessor', vitePreprocessor()) }, specPattern: 'tests/e2e/specs/**/*.cy.{js,jsx,ts,tsx}', supportFile: 'tests/e2e/support/index.ts', }, }) ```
/content/code_sandbox/packages/test-e2e-composable-vue3/cypress.config.ts
xml
2016-09-18T18:44:06
2024-08-14T21:22:24
apollo
vuejs/apollo
6,009
210
```xml <cobra document="path_to_url"> <cve id="CVE-2016-5100" level="LOW"> <product>froxlor:0.9.34.2</product> </cve> <cve id="CVE-2016-5101" level="MEDIUM"> <product>opera_mail:-</product> </cve> <cve id="CVE-2016-5102" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-5109" level="LOW"> <product>worx_home:10.3.0</product> <product>worx_home:10.3.1</product> <product>worx_home:10.3.5</product> <product>xenmobile_mdx_toolkit:10.3.0</product> <product>xenmobile_mdx_toolkit:10.3.5</product> </cve> <cve id="CVE-2016-0770" level="MEDIUM"> <product>connections_business_directory_plugin:8.5.8</product> </cve> <cve id="CVE-2016-0772" level="MEDIUM"> <product>python:2.7.11</product> <product>python:3.0</product> <product>python:3.0.1</product> <product>python:3.1.0</product> <product>python:3.1.1</product> <product>python:3.1.2</product> <product>python:3.1.3</product> <product>python:3.1.4</product> <product>python:3.1.5</product> <product>python:3.2.0</product> <product>python:3.2.1</product> <product>python:3.2.2</product> <product>python:3.2.3</product> <product>python:3.2.4</product> <product>python:3.2.5</product> <product>python:3.2.6</product> <product>python:3.3.0</product> <product>python:3.3.1</product> <product>python:3.3.2</product> <product>python:3.3.3</product> <product>python:3.3.4</product> <product>python:3.3.5</product> <product>python:3.3.6</product> <product>python:3.4.0</product> <product>python:3.4.1</product> <product>python:3.4.2</product> <product>python:3.4.3</product> <product>python:3.4.4</product> <product>python:3.5.0</product> <product>python:3.5.1</product> </cve> <cve id="CVE-2016-0779" level="LOW"> <product>tomee:1.7.3</product> <product>tomee:7.0.0</product> </cve> <cve id="CVE-2016-9360" level="MEDIUM"> <product>cimplicity:9.0</product> <product>historian:6.0</product> <product>ifix:5.8</product> </cve> <cve id="CVE-2016-9361" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9362" level="LOW"> <product>750-xxxx_series_firmware:-</product> <product>758-xxxx_series_firmware:-</product> <product>pfc200_firmware:-</product> </cve> <cve id="CVE-2016-9363" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9812" level="LOW"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9365" level="MEDIUM"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9366" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9367" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9368" level="LOW"> <product>xcomfort_ethernet_communication_interface:1.07</product> </cve> <cve id="CVE-2016-9369" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9818" level="LOW"> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9819" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-10125" level="MEDIUM"> <product>dgs-1100_firmware:1.01.018</product> </cve> <cve id="CVE-2016-10124" level="LOW"> <product>lxc:2.0.0</product> </cve> <cve id="CVE-2016-10127" level="MEDIUM"> <product>pysaml2:-</product> </cve> <cve id="CVE-2016-10126" level="LOW"> <product>splunk:5.0.0</product> <product>splunk:5.0.1</product> <product>splunk:5.0.2</product> <product>splunk:5.0.3</product> <product>splunk:5.0.4</product> <product>splunk:5.0.5</product> <product>splunk:5.0.6</product> <product>splunk:5.0.7</product> <product>splunk:5.0.8</product> <product>splunk:5.0.9</product> <product>splunk:5.0.10</product> <product>splunk:5.0.11</product> <product>splunk:5.0.12</product> <product>splunk:5.0.13</product> <product>splunk:5.0.14</product> <product>splunk:5.0.15</product> <product>splunk:5.0.16</product> <product>splunk:6.0.0</product> <product>splunk:6.0.1</product> <product>splunk:6.0.2</product> <product>splunk:6.0.3</product> <product>splunk:6.0.4</product> <product>splunk:6.0.5</product> <product>splunk:6.0.6</product> <product>splunk:6.0.7</product> <product>splunk:6.0.8</product> <product>splunk:6.0.9</product> <product>splunk:6.0.10</product> <product>splunk:6.0.11</product> <product>splunk:6.0.12</product> <product>splunk:6.1.0</product> <product>splunk:6.1.1</product> <product>splunk:6.1.2</product> <product>splunk:6.1.3</product> <product>splunk:6.1.4</product> <product>splunk:6.1.5</product> <product>splunk:6.1.6</product> <product>splunk:6.1.7</product> <product>splunk:6.1.8</product> <product>splunk:6.1.9</product> <product>splunk:6.1.10</product> <product>splunk:6.1.11</product> <product>splunk:6.2.0</product> <product>splunk:6.2.1</product> <product>splunk:6.2.2</product> <product>splunk:6.2.3</product> <product>splunk:6.2.4</product> <product>splunk:6.2.5</product> <product>splunk:6.2.6</product> <product>splunk:6.2.7</product> <product>splunk:6.2.8</product> <product>splunk:6.2.9</product> <product>splunk:6.2.10</product> <product>splunk:6.2.11</product> <product>splunk:6.3.0</product> <product>splunk:6.3.1</product> <product>splunk:6.3.2</product> <product>splunk:6.3.3</product> <product>splunk:6.3.4</product> <product>splunk:6.3.5</product> <product>splunk:6.3.6</product> <product>splunk:6.3.7</product> <product>splunk:6.4.0</product> <product>splunk:6.4.1</product> <product>splunk:6.4.2</product> <product>splunk:6.4.3</product> </cve> <cve id="CVE-2016-10121" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10120" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10123" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10122" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10129" level="LOW"> <product>libgit2:0.24.5</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> </cve> <cve id="CVE-2016-10128" level="LOW"> <product>libgit2:0.24.5</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> </cve> <cve id="CVE-2016-10699" level="MEDIUM"> <product>dsl-2740e_firmware:1.00_bg_20150720</product> </cve> <cve id="CVE-2016-10698" level="MEDIUM"> <product>mystem-fix:0.0.5</product> </cve> <cve id="CVE-2016-5812" level="LOW"> <product>oncell_g3001_firmware:1.6</product> <product>oncell_g3100v2_firmware:2.7</product> </cve> <cve id="CVE-2016-5813" level="LOW"> <product>powerlink2_firmware:-</product> </cve> <cve id="CVE-2016-5810" level="LOW"> <product>webaccess:8.1</product> </cve> <cve id="CVE-2016-5811" level="MEDIUM"> <product>powerlink2_firmware:-</product> </cve> <cve id="CVE-2016-5816" level="LOW"> <product>mrd-305-din_firmware:-</product> <product>mrd-315-din_firmware:-</product> <product>mrd-355-din_firmware:-</product> <product>mrd-455-din_firmware:-</product> </cve> <cve id="CVE-2016-5817" level="LOW"> <product>webaccess:2016-08-09</product> </cve> <cve id="CVE-2016-5814" level="MEDIUM"> <product>rslogix_500_professional_edition:-</product> <product>rslogix_500_standard_edition:-</product> <product>rslogix_500_starter_edition:-</product> <product>rslogix_micro_developer:-</product> <product>rslogix_micro_starter_lite:-</product> </cve> <cve id="CVE-2016-5815" level="LOW"> <product>ion5000:-</product> <product>ion7300:-</product> <product>ion7500:-</product> <product>ion7600:-</product> <product>ion8650:-</product> <product>ion8800:-</product> </cve> <cve id="CVE-2016-5818" level="LOW"> <product>powerlogic_pm8ecc_firmware:2.651</product> </cve> <cve id="CVE-2016-4457" level="LOW"> <product>cloudforms_management_engine:5.7</product> </cve> <cve id="CVE-2016-4456" level="LOW"> <product>gnutls:3.4.12</product> </cve> <cve id="CVE-2016-10345" level="LOW"> <product>passenger:5.0.30</product> </cve> <cve id="CVE-2016-10349" level="MEDIUM"> <product>libarchive:3.2.2</product> </cve> <cve id="CVE-2016-9816" level="LOW"> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9817" level="LOW"> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9814" level="LOW"> <product>saml2:1.9</product> <product>saml2:1.10</product> <product>saml2:1.10.1</product> <product>saml2:1.10.2</product> <product>saml2:2.0.0</product> <product>saml2:2.0.1</product> <product>saml2:2.1</product> <product>saml2:2.2</product> <product>saml2:2.3</product> <product>saml2:2.3.1</product> <product>saml2:2.3.2</product> <product>simplesamlphp:1.10</product> <product>simplesamlphp:1.14.9</product> </cve> <cve id="CVE-2016-9815" level="LOW"> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9364" level="LOW"> <product>fx-2030a-basic_firmware:11.50.18</product> <product>fx-2030a_firmware:11.50.18</product> </cve> <cve id="CVE-2016-9813" level="MEDIUM"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9810" level="MEDIUM"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9811" level="MEDIUM"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-6045" level="MEDIUM"> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.1</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.1</product> <product>tivoli_storage_manager:6.4.2.2</product> <product>tivoli_storage_manager:6.4.2.3</product> <product>tivoli_storage_manager:6.4.2.4</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-10697" level="MEDIUM"> <product>react-native-baidu-voice-synthesizer:1.0.0</product> </cve> <cve id="CVE-2016-1000307" level="MEDIUM"> <product>clipbucket:2.8.1</product> </cve> <cve id="CVE-2016-10695" level="MEDIUM"> <product>npm-test-sqlite3-trunk:4.0.1</product> </cve> <cve id="CVE-2016-10693" level="MEDIUM"> <product>pm2-kafka:1.0.0</product> </cve> <cve id="CVE-2016-10692" level="MEDIUM"> <product>haxeshim:0.12.4</product> </cve> <cve id="CVE-2016-10690" level="MEDIUM"> <product>openframe-ascii-image:0.1.0</product> </cve> <cve id="CVE-2016-3425" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jrockit:r28.3.9</product> </cve> <cve id="CVE-2016-0949" level="LOW"> <product>connect:9.5.2</product> </cve> <cve id="CVE-2016-0948" level="MEDIUM"> <product>connect:9.5</product> </cve> <cve id="CVE-2016-0943" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0942" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0941" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0940" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0947" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0946" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0945" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0944" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-1876" level="LOW"> <product>solution_center:3.3.0001</product> </cve> <cve id="CVE-2016-10594" level="MEDIUM"> <product>ipip:-</product> </cve> <cve id="CVE-2016-10595" level="MEDIUM"> <product>node-sass:1.0.18</product> </cve> <cve id="CVE-2016-10596" level="MEDIUM"> <product>imageoptim:0.5.0</product> </cve> <cve id="CVE-2016-10597" level="MEDIUM"> <product>cobalt-cli:2.2.0</product> </cve> <cve id="CVE-2016-10590" level="MEDIUM"> <product>cue-sdk-node:1.2.0</product> </cve> <cve id="CVE-2016-10592" level="MEDIUM"> <product>jser-stat:4.0.3</product> </cve> <cve id="CVE-2016-10593" level="MEDIUM"> <product>ibapi:2.4.2</product> </cve> <cve id="CVE-2016-10598" level="MEDIUM"> <product>arrayfire-js:0.21.4</product> </cve> <cve id="CVE-2016-10599" level="MEDIUM"> <product>sauce-connect:0.1.1</product> </cve> <cve id="CVE-2016-8779" level="LOW"> <product>fusionaccess:v100r005c10</product> <product>fusionaccess:v100r005c20</product> </cve> <cve id="CVE-2016-8774" level="LOW"> <product>mate_8_firmware:-</product> <product>mate_s_firmware:-</product> <product>p8_firmware:-</product> <product>p9_firmware:-</product> </cve> <cve id="CVE-2016-8775" level="LOW"> <product>nem-al10_firmware:-</product> <product>nem-l21_firmware:-</product> <product>nem-l22_firmware:-</product> <product>nem-l51_firmware:-</product> </cve> <cve id="CVE-2016-8776" level="LOW"> <product>p9_firmware:eva-al10c00</product> <product>p9_firmware:eva-cl10c00</product> <product>p9_firmware:eva-dl10c00</product> <product>p9_firmware:eva-tl10c00</product> <product>p9_lite_firmware:vns-l21c185</product> </cve> <cve id="CVE-2016-8773" level="LOW"> <product>s12700_firmware:v200r007c00</product> <product>s12700_firmware:v200r007c01</product> <product>s12700_firmware:v200r008c00</product> <product>s12700_firmware:v200r009c00</product> <product>s5300_firmware:v200r003c00</product> <product>s5300_firmware:v200r007c00</product> <product>s5300_firmware:v200r008c00</product> <product>s5300_firmware:v200r009c00</product> <product>s5700_firmware:v200r001c00</product> <product>s5700_firmware:v200r002c00</product> <product>s5700_firmware:v200r003c00</product> <product>s5700_firmware:v200r005c00</product> <product>s5700_firmware:v200r005c03</product> <product>s5700_firmware:v200r007c00</product> <product>s5700_firmware:v200r008c00</product> <product>s5700_firmware:v200r009c00</product> <product>s6300_firmware:v200r003c00</product> <product>s6300_firmware:v200r005c00</product> <product>s6300_firmware:v200r008c00</product> <product>s6300_firmware:v200r009c00</product> <product>s6700_firmware:v200r001c00</product> <product>s6700_firmware:v200r001c01</product> <product>s6700_firmware:v200r002c00</product> <product>s6700_firmware:v200r003c00</product> <product>s6700_firmware:v200r005c00</product> <product>s6700_firmware:v200r007c00</product> <product>s6700_firmware:v200r008c00</product> <product>s6700_firmware:v200r009c00</product> <product>s7700_firmware:v200r007c00</product> <product>s7700_firmware:v200r008c00</product> <product>s7700_firmware:v200r009c00</product> <product>s9300_firmware:v200r007c00</product> <product>s9300_firmware:v200r008c00</product> <product>s9300_firmware:v200r009c00</product> <product>s9700_firmware:v200r007c00</product> <product>s9700_firmware:v200r008c00</product> <product>s9700_firmware:v200r009c00</product> </cve> <cve id="CVE-2016-0569" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> <product>e-business_intelligence:12.1.1</product> <product>e-business_intelligence:12.1.2</product> <product>e-business_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0568" level="LOW"> <product>email_center:12.1.1</product> <product>email_center:12.1.2</product> <product>email_center:12.1.3</product> </cve> <cve id="CVE-2016-0561" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> <product>e-business_intelligence:12.1.1</product> <product>e-business_intelligence:12.1.2</product> <product>e-business_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0560" level="LOW"> <product>customer_intelligence:11.5.10.2</product> <product>customer_intelligence:12.1.1</product> <product>customer_intelligence:12.1.2</product> <product>customer_intelligence:12.1.3</product> <product>customer_intelligence:12.2.3</product> <product>customer_intelligence:12.2.4</product> <product>customer_intelligence:12.2.5</product> </cve> <cve id="CVE-2016-0563" level="LOW"> <product>crm_technical_foundation:11.5.10.2</product> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-0562" level="LOW"> <product>common_applications:11.5.10.2</product> <product>common_applications:12.1.1</product> <product>common_applications:12.1.2</product> <product>common_applications:12.1.3</product> </cve> <cve id="CVE-2016-0565" level="LOW"> <product>marketing:11.5.10.2</product> <product>marketing:12.1.1</product> <product>marketing:12.1.2</product> <product>marketing:12.1.3</product> </cve> <cve id="CVE-2016-0564" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> <product>e-business_intelligence:12.1.1</product> <product>e-business_intelligence:12.1.2</product> <product>e-business_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0567" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> <product>e-business_intelligence:12.1.1</product> <product>e-business_intelligence:12.1.2</product> <product>e-business_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0566" level="LOW"> <product>marketing:11.5.10.2</product> <product>marketing:12.1.1</product> <product>marketing:12.1.2</product> <product>marketing:12.1.3</product> <product>marketing:12.2.3</product> <product>marketing:12.2.4</product> <product>marketing:12.2.5</product> </cve> <cve id="CVE-2016-1168" level="MEDIUM"> <product>wf800hp_firmware:1.0.17</product> </cve> <cve id="CVE-2016-1169" level="MEDIUM"> <product>casebook_plugin:0.9.3</product> </cve> <cve id="CVE-2016-4442" level="LOW"> <product>rack-mini-profiler:0.9.9.2</product> </cve> <cve id="CVE-2016-4443" level="LOW"> <product>enterprise_virtualization:3.6</product> </cve> <cve id="CVE-2016-1160" level="MEDIUM"> <product>_wp_favorite_posts:1.6.2</product> </cve> <cve id="CVE-2016-1161" level="MEDIUM"> <product>password_manager_pro:8.5</product> </cve> <cve id="CVE-2016-1167" level="MEDIUM"> <product>wg300hp_firmware:1.0.8</product> </cve> <cve id="CVE-2016-1386" level="LOW"> <product>application_policy_infrastructure_controller_enterprise_module:1.0.%281%29</product> </cve> <cve id="CVE-2016-1387" level="LOW"> <product>telepresence_tc_software:7.2.0</product> <product>telepresence_tc_software:7.2.1</product> <product>telepresence_tc_software:7.3.0</product> <product>telepresence_tc_software:7.3.1</product> <product>telepresence_tc_software:7.3.2</product> <product>telepresence_tc_software:7.3.3</product> </cve> <cve id="CVE-2016-1385" level="LOW"> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.5.1</product> <product>adaptive_security_appliance_software:8.5.1.1</product> <product>adaptive_security_appliance_software:8.5.1.6</product> <product>adaptive_security_appliance_software:8.5.1.7</product> <product>adaptive_security_appliance_software:8.5.1.14</product> <product>adaptive_security_appliance_software:8.5.1.17</product> <product>adaptive_security_appliance_software:8.5.1.18</product> <product>adaptive_security_appliance_software:8.5.1.19</product> <product>adaptive_security_appliance_software:8.5.1.21</product> <product>adaptive_security_appliance_software:8.5.1.24</product> <product>adaptive_security_appliance_software:8.6.1</product> <product>adaptive_security_appliance_software:8.6.1.1</product> <product>adaptive_security_appliance_software:8.6.1.2</product> <product>adaptive_security_appliance_software:8.6.1.5</product> <product>adaptive_security_appliance_software:8.6.1.10</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:8.6.1.13</product> <product>adaptive_security_appliance_software:8.6.1.14</product> <product>adaptive_security_appliance_software:8.6.1.17</product> <product>adaptive_security_appliance_software:8.7.1</product> <product>adaptive_security_appliance_software:8.7.1.1</product> <product>adaptive_security_appliance_software:8.7.1.3</product> <product>adaptive_security_appliance_software:8.7.1.4</product> <product>adaptive_security_appliance_software:8.7.1.7</product> <product>adaptive_security_appliance_software:8.7.1.8</product> <product>adaptive_security_appliance_software:8.7.1.11</product> <product>adaptive_security_appliance_software:8.7.1.13</product> <product>adaptive_security_appliance_software:8.7.1.16</product> <product>adaptive_security_appliance_software:8.7.1.17</product> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.5.1</product> <product>adaptive_security_appliance_software:9.5.2</product> </cve> <cve id="CVE-2016-1382" level="LOW"> <product>web_security_appliance_%28wsa%29:5.6.0-623</product> <product>web_security_appliance_%28wsa%29:6.0.0-000</product> <product>web_security_appliance_%28wsa%29:7.1.0</product> <product>web_security_appliance_%28wsa%29:7.1.1</product> <product>web_security_appliance_%28wsa%29:7.1.2</product> <product>web_security_appliance_%28wsa%29:7.1.3</product> <product>web_security_appliance_%28wsa%29:7.1.4</product> <product>web_security_appliance_%28wsa%29:7.5.0-000</product> <product>web_security_appliance_%28wsa%29:7.5.0-825</product> <product>web_security_appliance_%28wsa%29:7.5.1-000</product> <product>web_security_appliance_%28wsa%29:7.5.2-000</product> <product>web_security_appliance_%28wsa%29:7.7.0-000</product> <product>web_security_appliance_%28wsa%29:7.7.1-000</product> <product>web_security_appliance_%28wsa%29:8.0.0-000</product> <product>web_security_appliance_%28wsa%29:8.0.5</product> <product>web_security_appliance_%28wsa%29:8.0.6</product> <product>web_security_appliance_%28wsa%29:8.0.6-078</product> <product>web_security_appliance_%28wsa%29:8.0.6-119</product> <product>web_security_appliance_%28wsa%29:8.0.7</product> <product>web_security_appliance_%28wsa%29:8.0.7-142</product> <product>web_security_appliance_%28wsa%29:8.0.8-mr-113</product> <product>web_security_appliance_%28wsa%29:8.5.0-497</product> <product>web_security_appliance_%28wsa%29:8.5.0.000</product> <product>web_security_appliance_%28wsa%29:8.5.1-021</product> <product>web_security_appliance_%28wsa%29:8.5.2-024</product> <product>web_security_appliance_%28wsa%29:8.5.2-027</product> <product>web_security_appliance_%28wsa%29:8.5.3-055</product> </cve> <cve id="CVE-2016-1383" level="LOW"> <product>web_security_appliance_%28wsa%29:5.6.0-623</product> <product>web_security_appliance_%28wsa%29:6.0.0-000</product> <product>web_security_appliance_%28wsa%29:7.1.0</product> <product>web_security_appliance_%28wsa%29:7.1.1</product> <product>web_security_appliance_%28wsa%29:7.1.2</product> <product>web_security_appliance_%28wsa%29:7.1.3</product> <product>web_security_appliance_%28wsa%29:7.1.4</product> <product>web_security_appliance_%28wsa%29:7.5.0-000</product> <product>web_security_appliance_%28wsa%29:7.5.0-825</product> <product>web_security_appliance_%28wsa%29:7.5.1-000</product> <product>web_security_appliance_%28wsa%29:7.5.2-000</product> <product>web_security_appliance_%28wsa%29:7.7.0-000</product> <product>web_security_appliance_%28wsa%29:7.7.1-000</product> <product>web_security_appliance_%28wsa%29:8.0.0-000</product> <product>web_security_appliance_%28wsa%29:8.0.5</product> <product>web_security_appliance_%28wsa%29:8.0.6</product> <product>web_security_appliance_%28wsa%29:8.0.6-078</product> <product>web_security_appliance_%28wsa%29:8.0.6-119</product> <product>web_security_appliance_%28wsa%29:8.0.7</product> <product>web_security_appliance_%28wsa%29:8.0.7-142</product> <product>web_security_appliance_%28wsa%29:8.0.8-mr-113</product> <product>web_security_appliance_%28wsa%29:8.5.0-497</product> <product>web_security_appliance_%28wsa%29:8.5.0.000</product> <product>web_security_appliance_%28wsa%29:8.5.1-021</product> <product>web_security_appliance_%28wsa%29:8.5.2-024</product> <product>web_security_appliance_%28wsa%29:8.5.2-027</product> <product>web_security_appliance_%28wsa%29:8.5.3-055</product> </cve> <cve id="CVE-2016-1380" level="LOW"> <product>web_security_appliance:8.0.0-000</product> <product>web_security_appliance:8.0.5</product> <product>web_security_appliance:8.0.6</product> <product>web_security_appliance:8.0.6-078</product> <product>web_security_appliance:8.0.6-119</product> <product>web_security_appliance:8.0.7</product> <product>web_security_appliance:8.0.7-142</product> <product>web_security_appliance:8.0.8-mr-113</product> <product>web_security_appliance:8.5.0-000</product> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:8.5.1-021</product> <product>web_security_appliance:8.5.2-024</product> <product>web_security_appliance:8.5.2-027</product> <product>web_security_appliance:8.5.3-055</product> </cve> <cve id="CVE-2016-1381" level="LOW"> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:8.5.0.000</product> <product>web_security_appliance:8.5.1-021</product> <product>web_security_appliance:8.5.2-024</product> <product>web_security_appliance:8.5.2-027</product> <product>web_security_appliance:8.5.3-055</product> <product>web_security_appliance:9.0.0-193</product> <product>web_security_appliance:9.0_base</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1_base</product> </cve> <cve id="CVE-2016-0255" level="MEDIUM"> <product>marketing_platform:9.1</product> <product>marketing_platform:9.1.1</product> <product>marketing_platform:9.1.2</product> <product>marketing_platform:10.0</product> </cve> <cve id="CVE-2016-1388" level="LOW"> <product>prime_network_analysis_module_software:5.0.0</product> <product>prime_network_analysis_module_software:5.0.1</product> <product>prime_network_analysis_module_software:5.0.2</product> <product>prime_network_analysis_module_software:5.1.0</product> <product>prime_network_analysis_module_software:5.1.2</product> <product>prime_network_analysis_module_software:6.0.2</product> <product>prime_network_analysis_module_software:6.1.0</product> <product>prime_network_analysis_module_software:6.1.1</product> <product>prime_network_analysis_module_software:6.2.0</product> <product>prime_virtual_network_analysis_module_software:6.0.0</product> <product>prime_virtual_network_analysis_module_software:6.1.0</product> <product>prime_virtual_network_analysis_module_software:6.2.0</product> <product>network_analysis_module</product> </cve> <cve id="CVE-2016-1389" level="MEDIUM"> <product>webex_meetings_server:2.6.0</product> </cve> <cve id="CVE-2016-0389" level="LOW"> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-0385" level="MEDIUM"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>websphere_application_server:9.0.0.0</product> </cve> <cve id="CVE-2016-0387" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-0386" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-0381" level="LOW"> <product>cognos_tm1:10.2.2</product> </cve> <cve id="CVE-2016-0380" level="LOW"> <product>sterling_connect_direct:4.1.0.0</product> <product>sterling_connect_direct:4.1.0.1</product> <product>sterling_connect_direct:4.1.0.2</product> <product>sterling_connect_direct:4.1.0.3</product> <product>sterling_connect_direct:4.1.0.4</product> <product>sterling_connect_direct:4.2.0.0</product> <product>sterling_connect_direct:4.2.0.1</product> <product>sterling_connect_direct:4.2.0.2</product> <product>sterling_connect_direct:4.2.0.3</product> <product>sterling_connect_direct:4.2.0.4</product> </cve> <cve id="CVE-2016-0382" level="LOW"> <product>tealeaf_consumer_experience:8.7</product> <product>tealeaf_consumer_experience:8.7.0</product> <product>tealeaf_consumer_experience:8.7.1</product> <product>tealeaf_consumer_experience:8.8</product> <product>tealeaf_consumer_experience:8.8.0</product> <product>tealeaf_consumer_experience:8.8.1</product> <product>tealeaf_consumer_experience:8.8.2</product> <product>tealeaf_consumer_experience:9.0</product> <product>tealeaf_consumer_experience:9.0.1</product> <product>tealeaf_consumer_experience:9.0.2</product> </cve> <cve id="CVE-2016-5715" level="MEDIUM"> <product>puppet:2015.2.0</product> <product>puppet:2015.2.1</product> <product>puppet:2015.2.2</product> <product>puppet:2015.2.3</product> <product>puppet:2015.3.0</product> <product>puppet:2015.3.1</product> <product>puppet:2015.3.2</product> <product>puppet:2015.3.3</product> <product>puppet:2016.1.1</product> <product>puppet:2016.1.2</product> <product>puppet:2016.2.0</product> <product>puppet:2016.2.1</product> <product>puppet:2016.4.0</product> </cve> <cve id="CVE-2016-5714" level="LOW"> <product>puppet_agent:1.3.6</product> <product>puppet_agent:1.4.0</product> <product>puppet_agent:1.4.1</product> <product>puppet_agent:1.4.2</product> <product>puppet_agent:1.5.0</product> <product>puppet_agent:1.5.1</product> <product>puppet_agent:1.5.2</product> <product>puppet_agent:1.5.3</product> <product>puppet_agent:1.6.0</product> <product>puppet_agent:1.6.1</product> <product>puppet_agent:1.6.2</product> <product>puppet_agent:1.7.0</product> <product>puppet_enterprise:2015.3.3</product> <product>puppet_enterprise:2016.1.1</product> <product>puppet_enterprise:2016.1.2</product> <product>puppet_enterprise:2016.2.0</product> <product>puppet_enterprise:2016.2.1</product> </cve> <cve id="CVE-2016-5716" level="LOW"> <product>puppet_enterprise:2015.2.0</product> <product>puppet_enterprise:2015.2.1</product> <product>puppet_enterprise:2015.2.2</product> <product>puppet_enterprise:2015.2.3</product> <product>puppet_enterprise:2015.3.0</product> <product>puppet_enterprise:2015.3.1</product> <product>puppet_enterprise:2015.3.2</product> <product>puppet_enterprise:2015.3.3</product> <product>puppet_enterprise:2016.1.1</product> <product>puppet_enterprise:2016.1.2</product> <product>puppet_enterprise:2016.2.0</product> <product>puppet_enterprise:2016.2.1</product> </cve> <cve id="CVE-2016-5711" level="MEDIUM"> <product>virtual_storage_console_for_vmware_vsphere:6.2</product> </cve> <cve id="CVE-2016-0252" level="MEDIUM"> <product>control_center:6.0.0.0</product> <product>sterling_control_center:5.4.0.0</product> <product>sterling_control_center:5.4.0.1</product> <product>sterling_control_center:5.4.1</product> <product>sterling_control_center:5.4.1.0</product> <product>sterling_control_center:5.4.2</product> <product>sterling_control_center:5.4.2.0</product> </cve> <cve id="CVE-2016-2840" level="MEDIUM"> <product>open-xchange_appsuite:7.8.0</product> </cve> <cve id="CVE-2016-2842" level="LOW"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> </cve> <cve id="CVE-2016-2846" level="LOW"> <product>simatic_s7_cpu_1200_firmware:3.0.2</product> </cve> <cve id="CVE-2016-2848" level="LOW"> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> </cve> <cve id="CVE-2016-9602" level="LOW"> <product>qemu:-</product> <product>qemu:0.1</product> <product>qemu:0.1.0</product> <product>qemu:0.1.1</product> <product>qemu:0.1.2</product> <product>qemu:0.1.3</product> <product>qemu:0.1.4</product> <product>qemu:0.1.5</product> <product>qemu:0.1.6</product> <product>qemu:0.2</product> <product>qemu:0.2.0</product> <product>qemu:0.3</product> <product>qemu:0.3.0</product> <product>qemu:0.4</product> <product>qemu:0.4.0</product> <product>qemu:0.4.1</product> <product>qemu:0.4.2</product> <product>qemu:0.4.3</product> <product>qemu:0.4.4</product> <product>qemu:0.5.0</product> <product>qemu:0.5.1</product> <product>qemu:0.5.2</product> <product>qemu:0.5.3</product> <product>qemu:0.5.4</product> <product>qemu:0.5.5</product> <product>qemu:0.6.0</product> <product>qemu:0.6.1</product> <product>qemu:0.7.0</product> <product>qemu:0.7.1</product> <product>qemu:0.7.2</product> <product>qemu:0.8.0</product> <product>qemu:0.8.1</product> <product>qemu:0.8.2</product> <product>qemu:0.9.0</product> <product>qemu:0.9.1</product> <product>qemu:0.9.1-5</product> <product>qemu:0.10.0</product> <product>qemu:0.10.1</product> <product>qemu:0.10.2</product> <product>qemu:0.10.3</product> <product>qemu:0.10.4</product> <product>qemu:0.10.5</product> <product>qemu:0.10.6</product> <product>qemu:0.11.0</product> <product>qemu:0.11.0</product> <product>qemu:0.11.0</product> <product>qemu:0.11.0</product> <product>qemu:0.11.0-rc0</product> <product>qemu:0.11.0-rc1</product> <product>qemu:0.11.0-rc2</product> <product>qemu:0.11.1</product> <product>qemu:0.12.0</product> <product>qemu:0.12.0</product> <product>qemu:0.12.0</product> <product>qemu:0.12.1</product> <product>qemu:0.12.2</product> <product>qemu:0.12.3</product> <product>qemu:0.12.4</product> <product>qemu:0.12.5</product> <product>qemu:0.13.0</product> <product>qemu:0.13.0</product> <product>qemu:0.13.0</product> <product>qemu:0.14.0</product> <product>qemu:0.14.0</product> <product>qemu:0.14.0</product> <product>qemu:0.14.0</product> <product>qemu:0.14.1</product> <product>qemu:0.15.0</product> <product>qemu:0.15.0</product> <product>qemu:0.15.0</product> <product>qemu:0.15.1</product> <product>qemu:0.15.2</product> <product>qemu:1.0</product> <product>qemu:1.0</product> <product>qemu:1.0</product> <product>qemu:1.0</product> <product>qemu:1.0</product> <product>qemu:1.0.1</product> <product>qemu:1.1</product> <product>qemu:1.1</product> <product>qemu:1.1</product> <product>qemu:1.1</product> <product>qemu:1.1</product> <product>qemu:1.1.0</product> <product>qemu:1.1.1</product> <product>qemu:1.1.2</product> <product>qemu:1.2.0</product> <product>qemu:1.2.1</product> <product>qemu:1.2.2</product> <product>qemu:1.3.0</product> <product>qemu:1.3.1</product> <product>qemu:1.4.0</product> <product>qemu:1.4.1</product> <product>qemu:1.4.2</product> <product>qemu:1.5.0</product> <product>qemu:1.5.0</product> <product>qemu:1.5.0</product> <product>qemu:1.5.0</product> <product>qemu:1.5.1</product> <product>qemu:1.5.2</product> <product>qemu:1.5.3</product> <product>qemu:1.6.0</product> <product>qemu:1.6.0</product> <product>qemu:1.6.0</product> <product>qemu:1.6.0</product> <product>qemu:1.6.1</product> <product>qemu:1.6.2</product> <product>qemu:1.7.0</product> <product>qemu:1.7.1</product> <product>qemu:1.7.2</product> <product>qemu:2.0.0</product> <product>qemu:2.0.0</product> <product>qemu:2.0.0</product> <product>qemu:2.0.0</product> <product>qemu:2.0.0</product> <product>qemu:2.0.0</product> <product>qemu:2.0.1</product> <product>qemu:2.0.2</product> <product>qemu:2.1.0</product> <product>qemu:2.1.0</product> <product>qemu:2.1.0</product> <product>qemu:2.1.0</product> <product>qemu:2.1.0</product> <product>qemu:2.1.0</product> <product>qemu:2.1.1</product> <product>qemu:2.1.2</product> <product>qemu:2.1.3</product> <product>qemu:2.2.0</product> <product>qemu:2.2.1</product> <product>qemu:2.3.0</product> <product>qemu:2.3.1</product> <product>qemu:2.4.0</product> <product>qemu:2.4.0.1</product> <product>qemu:2.4.1</product> <product>qemu:2.5.0</product> <product>qemu:2.5.1</product> <product>qemu:2.5.1.1</product> <product>qemu:2.6.0</product> <product>qemu:2.6.1</product> <product>qemu:2.6.2</product> <product>qemu:2.7.0</product> <product>qemu:2.7.1</product> <product>qemu:2.8.0</product> <product>qemu:2.8.1</product> <product>qemu:2.8.1.1</product> </cve> <cve id="CVE-2016-9600" level="MEDIUM"> <product>jasper:1.900.1</product> <product>jasper:1.900.3</product> <product>jasper:1.900.5</product> <product>jasper:1.900.7</product> <product>jasper:1.900.8</product> <product>jasper:1.900.9</product> <product>jasper:1.900.10</product> <product>jasper:1.900.11</product> <product>jasper:1.900.12</product> <product>jasper:1.900.13</product> <product>jasper:1.900.14</product> <product>jasper:1.900.16</product> <product>jasper:1.900.17</product> <product>jasper:1.900.19</product> <product>jasper:1.900.21</product> <product>jasper:1.900.22</product> <product>jasper:1.900.24</product> <product>jasper:1.900.29</product> <product>jasper:2.0.6</product> <product>jasper:2.0.9</product> </cve> <cve id="CVE-2016-9606" level="MEDIUM"> <product>resteasy:3.1.1</product> </cve> <cve id="CVE-2016-2152" level="MEDIUM"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2153" level="MEDIUM"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2151" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2156" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2157" level="MEDIUM"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2154" level="LOW"> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2155" level="LOW"> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2158" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2159" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-3155" level="LOW"> <product>apogee_insight:-</product> </cve> <cve id="CVE-2016-3154" level="LOW"> <product>spip:2.0.0</product> <product>spip:2.0.1</product> <product>spip:2.0.2</product> <product>spip:2.0.3</product> <product>spip:2.0.4</product> <product>spip:2.0.5</product> <product>spip:2.0.6</product> <product>spip:2.0.7</product> <product>spip:2.0.8</product> <product>spip:2.0.9</product> <product>spip:2.0.10</product> <product>spip:2.0.11</product> <product>spip:2.0.12</product> <product>spip:2.0.13</product> <product>spip:2.0.14</product> <product>spip:2.0.15</product> <product>spip:2.0.16</product> <product>spip:2.0.17</product> <product>spip:2.0.18</product> <product>spip:2.0.19</product> <product>spip:2.0.20</product> <product>spip:2.0.21</product> <product>spip:2.0.22</product> <product>spip:2.1.1</product> <product>spip:2.1.2</product> <product>spip:2.1.3</product> <product>spip:2.1.4</product> <product>spip:2.1.5</product> <product>spip:2.1.6</product> <product>spip:2.1.7</product> <product>spip:2.1.8</product> <product>spip:2.1.9</product> <product>spip:2.1.10</product> <product>spip:2.1.11</product> <product>spip:2.1.12</product> <product>spip:2.1.13</product> <product>spip:2.1.14</product> <product>spip:2.1.15</product> <product>spip:2.1.16</product> <product>spip:2.1.17</product> <product>spip:2.1.18</product> <product>spip:2.1.19</product> <product>spip:3.0.0</product> <product>spip:3.0.1</product> <product>spip:3.0.2</product> <product>spip:3.0.3</product> <product>spip:3.0.4</product> <product>spip:3.0.5</product> <product>spip:3.0.6</product> <product>spip:3.0.7</product> <product>spip:3.0.8</product> <product>spip:3.0.9</product> <product>spip:3.0.10</product> <product>spip:3.0.11</product> <product>spip:3.0.13</product> <product>spip:3.0.14</product> <product>spip:3.0.15</product> <product>spip:3.0.16</product> <product>spip:3.0.17</product> <product>spip:3.0.19</product> <product>spip:3.0.20</product> <product>spip:3.1.0</product> </cve> <cve id="CVE-2016-3405" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3404" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3151" level="LOW"> <product>clickshare_csc-1_firmware:01.09.02.03</product> <product>clickshare_cse-200_firmware:01.03.01.05</product> <product>clickshare_csm-1_firmware:01.06.01.04</product> </cve> <cve id="CVE-2016-3402" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3401" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3152" level="LOW"> <product>clickshare_csc-1_firmware:01.09.02.03</product> </cve> <cve id="CVE-2016-6439" level="MEDIUM"> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.0.2</product> <product>firepower_management_center:5.3.0.3</product> <product>firepower_management_center:5.3.0.4</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.3.1.3</product> <product>firepower_management_center:5.3.1.4</product> <product>firepower_management_center:5.3.1.5</product> <product>firepower_management_center:5.3.1.6</product> <product>firepower_management_center:5.4.0</product> <product>firepower_management_center:5.4.0.2</product> <product>firepower_management_center:5.4.1</product> <product>firepower_management_center:5.4.1.1</product> <product>firepower_management_center:5.4.1.2</product> <product>firepower_management_center:5.4.1.3</product> <product>firepower_management_center:5.4.1.4</product> <product>firepower_management_center:5.4.1.5</product> <product>firepower_management_center:5.4.1.6</product> <product>firepower_management_center:5.4_base</product> <product>firepower_management_center:6.0.0</product> <product>firepower_management_center:6.0.0.0</product> <product>firepower_management_center:6.0.0.1</product> <product>firepower_management_center:6.0.1</product> <product>firepower_management_center:6.0_base</product> </cve> <cve id="CVE-2016-3158" level="LOW"> <product>fedora:22</product> <product>fedora:23</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> <product>xen:4.4.0</product> </cve> <cve id="CVE-2016-3409" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3408" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-7520" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7521" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7522" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7525" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7526" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7527" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7528" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7529" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-0237" level="LOW"> <product>security_guardium_database_activity_monitor:10.0</product> </cve> <cve id="CVE-2016-0236" level="LOW"> <product>security_guardium_database_activity_monitor:8.2</product> <product>security_guardium_database_activity_monitor:9.0</product> <product>security_guardium_database_activity_monitor:9.1</product> <product>security_guardium_database_activity_monitor:9.5</product> <product>security_guardium_database_activity_monitor:10.0</product> <product>security_guardium_database_activity_monitor:10.1</product> </cve> <cve id="CVE-2016-6651" level="LOW"> <product>cloud_foundry:242.0</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.6.30</product> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.6.33</product> <product>cloud_foundry_elastic_runtime:1.6.34</product> <product>cloud_foundry_elastic_runtime:1.6.35</product> <product>cloud_foundry_elastic_runtime:1.6.36</product> <product>cloud_foundry_elastic_runtime:1.6.37</product> <product>cloud_foundry_elastic_runtime:1.6.38</product> <product>cloud_foundry_elastic_runtime:1.6.39</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_elastic_runtime:1.7.13</product> <product>cloud_foundry_elastic_runtime:1.7.14</product> <product>cloud_foundry_elastic_runtime:1.7.15</product> <product>cloud_foundry_elastic_runtime:1.7.16</product> <product>cloud_foundry_elastic_runtime:1.7.17</product> <product>cloud_foundry_elastic_runtime:1.7.18</product> <product>cloud_foundry_elastic_runtime:1.7.19</product> <product>cloud_foundry_elastic_runtime:1.7.20</product> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_ops_manager:1.7.0</product> <product>cloud_foundry_ops_manager:1.7.1</product> <product>cloud_foundry_ops_manager:1.7.2</product> <product>cloud_foundry_ops_manager:1.7.3</product> <product>cloud_foundry_ops_manager:1.7.4</product> <product>cloud_foundry_ops_manager:1.7.5</product> <product>cloud_foundry_ops_manager:1.7.6</product> <product>cloud_foundry_ops_manager:1.7.7</product> <product>cloud_foundry_ops_manager:1.7.8</product> <product>cloud_foundry_ops_manager:1.7.9</product> <product>cloud_foundry_ops_manager:1.7.10</product> <product>cloud_foundry_ops_manager:1.7.11</product> <product>cloud_foundry_ops_manager:1.7.12</product> <product>cloud_foundry_ops_manager:1.8.0</product> <product>cloud_foundry_uaa:3.7.0</product> <product>cloud_foundry_uaa_bosh:16.0</product> </cve> <cve id="CVE-2016-6650" level="HIGH"> <product>recoverpoint:4.4.1.1</product> <product>recoverpoint_for_virtual_machines:4.4.1.1</product> </cve> <cve id="CVE-2016-6653" level="LOW"> <product>cloud_foundry_cf_mysql:27.0</product> <product>cloud_foundry_cf_mysql:28.0</product> </cve> <cve id="CVE-2016-6652" level="MEDIUM"> <product>spring_data_jpa:1.9.4</product> <product>spring_data_jpa:1.10.2</product> </cve> <cve id="CVE-2016-6655" level="LOW"> <product>cf-mysql-release:30</product> <product>cf-release:244</product> </cve> <cve id="CVE-2016-6657" level="MEDIUM"> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_elastic_runtime:1.8.1</product> <product>cloud_foundry_elastic_runtime:1.8.2</product> <product>cloud_foundry_elastic_runtime:1.8.3</product> <product>cloud_foundry_elastic_runtime:1.8.4</product> <product>cloud_foundry_elastic_runtime:1.8.5</product> <product>cloud_foundry_elastic_runtime:1.8.6</product> <product>cloud_foundry_elastic_runtime:1.8.7</product> <product>cloud_foundry_elastic_runtime:1.8.8</product> <product>cloud_foundry_elastic_runtime:1.8.9</product> <product>cloud_foundry_elastic_runtime:1.8.10</product> <product>cloud_foundry_elastic_runtime:1.8.11</product> <product>cloud_foundry_elastic_runtime:1.8.12</product> <product>cloud_foundry_ops_manager:1.7.0</product> <product>cloud_foundry_ops_manager:1.7.1</product> <product>cloud_foundry_ops_manager:1.7.2</product> <product>cloud_foundry_ops_manager:1.7.3</product> <product>cloud_foundry_ops_manager:1.7.4</product> <product>cloud_foundry_ops_manager:1.7.5</product> <product>cloud_foundry_ops_manager:1.7.6</product> <product>cloud_foundry_ops_manager:1.7.7</product> <product>cloud_foundry_ops_manager:1.7.8</product> <product>cloud_foundry_ops_manager:1.7.9</product> <product>cloud_foundry_ops_manager:1.7.10</product> <product>cloud_foundry_ops_manager:1.7.11</product> <product>cloud_foundry_ops_manager:1.7.12</product> <product>cloud_foundry_ops_manager:1.7.13</product> <product>cloud_foundry_ops_manager:1.7.14</product> <product>cloud_foundry_ops_manager:1.7.15</product> <product>cloud_foundry_ops_manager:1.7.16</product> <product>cloud_foundry_ops_manager:1.7.17</product> <product>cloud_foundry_ops_manager:1.7.18</product> <product>cloud_foundry_ops_manager:1.8.0</product> <product>cloud_foundry_ops_manager:1.8.1</product> <product>cloud_foundry_ops_manager:1.8.2</product> <product>cloud_foundry_ops_manager:1.8.3</product> <product>cloud_foundry_ops_manager:1.8.4</product> <product>cloud_foundry_ops_manager:1.8.5</product> <product>cloud_foundry_ops_manager:1.8.6</product> <product>cloud_foundry_ops_manager:1.8.7</product> <product>cloud_foundry_ops_manager:1.8.8</product> <product>cloud_foundry_ops_manager:1.8.9</product> <product>cloud_foundry_ops_manager:1.8.10</product> </cve> <cve id="CVE-2016-6656" level="LOW"> <product>greenplum:4.3.9.1</product> </cve> <cve id="CVE-2016-6659" level="HIGH"> <product>cloud_foundry:247.0</product> <product>cloud_foundry_uaa:3.9.2</product> <product>cloud_foundry_uaa_bosh:23.0</product> </cve> <cve id="CVE-2016-6658" level="LOW"> <product>cf-release:141</product> <product>cf-release:142</product> <product>cf-release:143</product> <product>cf-release:144</product> <product>cf-release:145</product> <product>cf-release:146</product> <product>cf-release:147</product> <product>cf-release:148</product> <product>cf-release:149</product> <product>cf-release:150</product> <product>cf-release:151</product> <product>cf-release:152</product> <product>cf-release:153</product> <product>cf-release:154</product> <product>cf-release:155</product> <product>cf-release:156</product> <product>cf-release:157</product> <product>cf-release:158</product> <product>cf-release:159</product> <product>cf-release:160</product> <product>cf-release:161</product> <product>cf-release:162</product> <product>cf-release:163</product> <product>cf-release:164</product> <product>cf-release:165</product> <product>cf-release:166</product> <product>cf-release:167</product> <product>cf-release:168</product> <product>cf-release:169</product> <product>cf-release:170</product> <product>cf-release:171</product> <product>cf-release:172</product> <product>cf-release:173</product> <product>cf-release:174</product> <product>cf-release:175</product> <product>cf-release:176</product> <product>cf-release:177</product> <product>cf-release:178</product> <product>cf-release:179</product> <product>cf-release:180</product> <product>cf-release:181</product> <product>cf-release:182</product> <product>cf-release:183</product> <product>cf-release:184</product> <product>cf-release:185</product> <product>cf-release:186</product> <product>cf-release:187</product> <product>cf-release:188</product> <product>cf-release:189</product> <product>cf-release:190</product> <product>cf-release:191</product> <product>cf-release:192</product> <product>cf-release:193</product> <product>cf-release:194</product> <product>cf-release:195</product> <product>cf-release:196</product> <product>cf-release:197</product> <product>cf-release:198</product> <product>cf-release:199</product> <product>cf-release:200</product> <product>cf-release:201</product> <product>cf-release:202</product> <product>cf-release:203</product> <product>cf-release:204</product> <product>cf-release:205</product> <product>cf-release:206</product> <product>cf-release:207</product> <product>cf-release:208</product> <product>cf-release:209</product> <product>cf-release:210</product> <product>cf-release:211</product> <product>cf-release:212</product> <product>cf-release:213</product> <product>cf-release:214</product> <product>cf-release:215</product> <product>cf-release:216</product> <product>cf-release:217</product> <product>cf-release:218</product> <product>cf-release:219</product> <product>cf-release:220</product> <product>cf-release:221</product> <product>cf-release:222</product> <product>cf-release:223</product> <product>cf-release:224</product> <product>cf-release:225</product> <product>cf-release:226</product> <product>cf-release:227</product> <product>cf-release:228</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.24</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.6.30</product> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.6.33</product> <product>cloud_foundry_elastic_runtime:1.6.34</product> <product>cloud_foundry_elastic_runtime:1.6.35</product> <product>cloud_foundry_elastic_runtime:1.6.36</product> <product>cloud_foundry_elastic_runtime:1.6.37</product> <product>cloud_foundry_elastic_runtime:1.6.38</product> <product>cloud_foundry_elastic_runtime:1.6.39</product> <product>cloud_foundry_elastic_runtime:1.6.40</product> <product>cloud_foundry_elastic_runtime:1.6.41</product> <product>cloud_foundry_elastic_runtime:1.6.42</product> <product>cloud_foundry_elastic_runtime:1.6.43</product> <product>cloud_foundry_elastic_runtime:1.6.44</product> <product>cloud_foundry_elastic_runtime:1.6.45</product> <product>cloud_foundry_elastic_runtime:1.6.46</product> <product>cloud_foundry_elastic_runtime:1.6.47</product> <product>cloud_foundry_elastic_runtime:1.6.48</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_elastic_runtime:1.7.13</product> <product>cloud_foundry_elastic_runtime:1.7.14</product> <product>cloud_foundry_elastic_runtime:1.7.15</product> <product>cloud_foundry_elastic_runtime:1.7.16</product> <product>cloud_foundry_elastic_runtime:1.7.17</product> <product>cloud_foundry_elastic_runtime:1.7.18</product> <product>cloud_foundry_elastic_runtime:1.7.19</product> <product>cloud_foundry_elastic_runtime:1.7.20</product> <product>cloud_foundry_elastic_runtime:1.7.21</product> <product>cloud_foundry_elastic_runtime:1.7.22</product> <product>cloud_foundry_elastic_runtime:1.7.23</product> <product>cloud_foundry_elastic_runtime:1.7.24</product> <product>cloud_foundry_elastic_runtime:1.7.25</product> <product>cloud_foundry_elastic_runtime:1.7.26</product> <product>cloud_foundry_elastic_runtime:1.7.27</product> <product>cloud_foundry_elastic_runtime:1.7.28</product> <product>cloud_foundry_elastic_runtime:1.7.29</product> <product>cloud_foundry_elastic_runtime:1.7.30</product> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_elastic_runtime:1.8.1</product> <product>cloud_foundry_elastic_runtime:1.8.2</product> <product>cloud_foundry_elastic_runtime:1.8.3</product> <product>cloud_foundry_elastic_runtime:1.8.4</product> <product>cloud_foundry_elastic_runtime:1.8.5</product> <product>cloud_foundry_elastic_runtime:1.8.6</product> <product>cloud_foundry_elastic_runtime:1.8.7</product> <product>cloud_foundry_elastic_runtime:1.8.8</product> <product>cloud_foundry_elastic_runtime:1.8.9</product> <product>cloud_foundry_elastic_runtime:1.8.10</product> </cve> <cve id="CVE-2016-1211" level="MEDIUM"> <product>web_mailing_list:0.31</product> </cve> <cve id="CVE-2016-0239" level="LOW"> <product>security_guardium_database_activity_monitor:9.0</product> <product>security_guardium_database_activity_monitor:9.1</product> <product>security_guardium_database_activity_monitor:9.5</product> <product>security_guardium_database_activity_monitor:10.0</product> <product>security_guardium_database_activity_monitor:10.0.1</product> </cve> <cve id="CVE-2016-1212" level="LOW"> <product>mp_form_mail_cgi:3.2.3</product> </cve> <cve id="CVE-2016-0238" level="MEDIUM"> <product>security_guardium:9.0</product> <product>security_guardium:9.1</product> <product>security_guardium:9.5</product> <product>security_guardium:10.0</product> <product>security_guardium:10.1</product> <product>security_guardium:10.1.2</product> </cve> <cve id="CVE-2016-9639" level="LOW"> <product>salt:2015.8.10</product> </cve> <cve id="CVE-2016-7384" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7385" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7386" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7387" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7381" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7382" level="LOW"> <product>gpu_driver:304.131</product> <product>gpu_driver:340.98</product> <product>gpu_driver:361.93.02</product> <product>gpu_driver:367.44</product> <product>gpu_driver:367.54</product> <product>gpu_driver:370.23</product> </cve> <cve id="CVE-2016-7383" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7388" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7389" level="LOW"> <product>gpu_driver:304.79</product> <product>gpu_driver:340.52</product> <product>gpu_driver:361.91</product> <product>gpu_driver:365.19</product> <product>gpu_driver:368.81</product> </cve> <cve id="CVE-2016-1214" level="MEDIUM"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-4877" level="MEDIUM"> <product>basercms:3.0.10</product> <product>mail_form:3.0.10</product> </cve> <cve id="CVE-2016-4876" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4875" level="MEDIUM"> <product>assist_plugin:1.1.0</product> <product>databox_plugin:0..0.0.20150609</product> <product>userbox_plugin:0.0.0.20150918</product> </cve> <cve id="CVE-2016-4879" level="MEDIUM"> <product>basercms:3.0.10</product> <product>mail_view:3.0.10</product> </cve> <cve id="CVE-2016-9631" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-0712" level="MEDIUM"> <product>jetspeed:2.3.0</product> </cve> <cve id="CVE-2016-0713" level="HIGH"> <product>cf-release:141</product> <product>cf-release:142</product> <product>cf-release:143</product> <product>cf-release:144</product> <product>cf-release:145</product> <product>cf-release:146</product> <product>cf-release:147</product> <product>cf-release:148</product> <product>cf-release:149</product> <product>cf-release:150</product> <product>cf-release:151</product> <product>cf-release:152</product> <product>cf-release:153</product> <product>cf-release:154</product> <product>cf-release:155</product> <product>cf-release:156</product> <product>cf-release:157</product> <product>cf-release:158</product> <product>cf-release:159</product> <product>cf-release:160</product> <product>cf-release:161</product> <product>cf-release:162</product> <product>cf-release:163</product> <product>cf-release:164</product> <product>cf-release:165</product> <product>cf-release:166</product> <product>cf-release:167</product> <product>cf-release:168</product> <product>cf-release:169</product> <product>cf-release:170</product> <product>cf-release:171</product> <product>cf-release:172</product> <product>cf-release:173</product> <product>cf-release:174</product> <product>cf-release:175</product> <product>cf-release:176</product> <product>cf-release:177</product> <product>cf-release:178</product> <product>cf-release:179</product> <product>cf-release:180</product> <product>cf-release:181</product> <product>cf-release:182</product> <product>cf-release:183</product> <product>cf-release:184</product> <product>cf-release:185</product> <product>cf-release:186</product> <product>cf-release:187</product> <product>cf-release:188</product> <product>cf-release:189</product> <product>cf-release:190</product> <product>cf-release:191</product> <product>cf-release:192</product> <product>cf-release:193</product> <product>cf-release:194</product> <product>cf-release:195</product> <product>cf-release:196</product> <product>cf-release:197</product> <product>cf-release:198</product> <product>cf-release:199</product> <product>cf-release:200</product> <product>cf-release:201</product> <product>cf-release:202</product> <product>cf-release:203</product> <product>cf-release:204</product> <product>cf-release:205</product> <product>cf-release:206</product> <product>cf-release:207</product> <product>cf-release:208</product> <product>cf-release:209</product> <product>cf-release:210</product> <product>cf-release:211</product> <product>cf-release:212</product> <product>cf-release:213</product> <product>cf-release:214</product> <product>cf-release:215</product> <product>cf-release:216</product> <product>cf-release:217</product> <product>cf-release:218</product> <product>cf-release:219</product> <product>cf-release:220</product> <product>cf-release:221</product> <product>cf-release:222</product> <product>cf-release:223</product> <product>cf-release:224</product> <product>cf-release:225</product> <product>cf-release:226</product> <product>cf-release:227</product> <product>cf-release:228</product> </cve> <cve id="CVE-2016-0710" level="LOW"> <product>jetspeed:2.3.0</product> </cve> <cve id="CVE-2016-0711" level="MEDIUM"> <product>jetspeed:2.3.0</product> </cve> <cve id="CVE-2016-9838" level="LOW"> <product>joomla%21:3.6.4</product> </cve> <cve id="CVE-2016-9839" level="LOW"> <product>mapserver:7.0.2</product> </cve> <cve id="CVE-2016-9834" level="MEDIUM"> <product>cyberoam_firmware:10.6.4</product> </cve> <cve id="CVE-2016-9835" level="LOW"> <product>zikula_application_framework:1.3.0</product> <product>zikula_application_framework:1.3.1</product> <product>zikula_application_framework:1.3.2</product> <product>zikula_application_framework:1.3.3</product> <product>zikula_application_framework:1.3.4</product> <product>zikula_application_framework:1.3.5</product> <product>zikula_application_framework:1.3.6</product> <product>zikula_application_framework:1.3.7</product> <product>zikula_application_framework:1.3.8</product> <product>zikula_application_framework:1.3.9</product> <product>zikula_application_framework:1.3.10</product> <product>zikula_application_framework:1.3.10</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.0</product> <product>zikula_application_framework:1.4.1</product> <product>zikula_application_framework:1.4.2</product> <product>zikula_application_framework:1.4.3</product> <product>zikula_application_framework:1.4.3</product> <product>zikula_application_framework:1.4.3</product> <product>zikula_application_framework:1.4.3</product> </cve> <cve id="CVE-2016-9836" level="LOW"> <product>joomla%21:3.6.4</product> </cve> <cve id="CVE-2016-9837" level="LOW"> <product>joomla%21:3.6.4</product> </cve> <cve id="CVE-2016-9831" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9832" level="LOW"> <product>ace-advanced_business_application_programming:8.10.304</product> </cve> <cve id="CVE-2016-1216" level="MEDIUM"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-10108" level="LOW"> <product>mycloud_nas:2.11.142</product> </cve> <cve id="CVE-2016-10107" level="LOW"> <product>mycloud_nas:2.11.142</product> </cve> <cve id="CVE-2016-10106" level="LOW"> <product>fvs318gv2_firmware:4.3-3.6</product> <product>fvs318n_firmware:4.3-3.6</product> <product>fvs336gv3_firmware:4.3-3.6</product> <product>srx5308_firmware:4.3-3.6</product> </cve> <cve id="CVE-2016-10105" level="LOW"> <product>piwigo:2.8.3</product> </cve> <cve id="CVE-2016-10104" level="MEDIUM"> <product>automize:10.00</product> <product>automize:10.01</product> <product>automize:10.02</product> <product>automize:10.03</product> <product>automize:10.04</product> <product>automize:10.05</product> <product>automize:10.06</product> <product>automize:10.07</product> <product>automize:10.08</product> <product>automize:10.09</product> <product>automize:10.11</product> <product>automize:10.12</product> <product>automize:10.13</product> <product>automize:10.14</product> <product>automize:10.15</product> <product>automize:10.16</product> <product>automize:10.17</product> <product>automize:10.18</product> <product>automize:10.19</product> <product>automize:10.20</product> <product>automize:10.21</product> <product>automize:10.22</product> <product>automize:10.23</product> <product>automize:10.24</product> <product>automize:10.25</product> <product>automize:11.00</product> <product>automize:11.01</product> <product>automize:11.02</product> <product>automize:11.03</product> <product>automize:11.04</product> <product>automize:11.05</product> <product>automize:11.06</product> <product>automize:11.07</product> <product>automize:11.08</product> <product>automize:11.09</product> <product>automize:11.11</product> <product>automize:11.12</product> <product>automize:11.13</product> <product>automize:11.14</product> </cve> <cve id="CVE-2016-10103" level="MEDIUM"> <product>automize:10.00</product> <product>automize:10.01</product> <product>automize:10.02</product> <product>automize:10.03</product> <product>automize:10.04</product> <product>automize:10.05</product> <product>automize:10.06</product> <product>automize:10.07</product> <product>automize:10.08</product> <product>automize:10.09</product> <product>automize:10.11</product> <product>automize:10.12</product> <product>automize:10.13</product> <product>automize:10.14</product> <product>automize:10.15</product> <product>automize:10.16</product> <product>automize:10.17</product> <product>automize:10.18</product> <product>automize:10.19</product> <product>automize:10.20</product> <product>automize:10.21</product> <product>automize:10.22</product> <product>automize:10.23</product> <product>automize:10.24</product> <product>automize:10.25</product> <product>automize:11.00</product> <product>automize:11.01</product> <product>automize:11.02</product> <product>automize:11.03</product> <product>automize:11.04</product> <product>automize:11.05</product> <product>automize:11.06</product> <product>automize:11.07</product> <product>automize:11.08</product> <product>automize:11.09</product> <product>automize:11.11</product> <product>automize:11.12</product> <product>automize:11.13</product> <product>automize:11.14</product> </cve> <cve id="CVE-2016-10102" level="MEDIUM"> <product>automize:10.00</product> <product>automize:10.01</product> <product>automize:10.02</product> <product>automize:10.03</product> <product>automize:10.04</product> <product>automize:10.05</product> <product>automize:10.06</product> <product>automize:10.07</product> <product>automize:10.08</product> <product>automize:10.09</product> <product>automize:10.11</product> <product>automize:10.12</product> <product>automize:10.13</product> <product>automize:10.14</product> <product>automize:10.15</product> <product>automize:10.16</product> <product>automize:10.17</product> <product>automize:10.18</product> <product>automize:10.19</product> <product>automize:10.20</product> <product>automize:10.21</product> <product>automize:10.22</product> <product>automize:10.23</product> <product>automize:10.24</product> <product>automize:10.25</product> <product>automize:11.00</product> <product>automize:11.01</product> <product>automize:11.02</product> <product>automize:11.03</product> <product>automize:11.04</product> <product>automize:11.05</product> <product>automize:11.06</product> <product>automize:11.07</product> <product>automize:11.08</product> <product>automize:11.09</product> <product>automize:11.11</product> <product>automize:11.12</product> <product>automize:11.13</product> <product>automize:11.14</product> </cve> <cve id="CVE-2016-10101" level="MEDIUM"> <product>automize:10.00</product> <product>automize:10.01</product> <product>automize:10.02</product> <product>automize:10.03</product> <product>automize:10.04</product> <product>automize:10.05</product> <product>automize:10.06</product> <product>automize:10.07</product> <product>automize:10.08</product> <product>automize:10.09</product> <product>automize:10.11</product> <product>automize:10.12</product> <product>automize:10.13</product> <product>automize:10.14</product> <product>automize:10.15</product> <product>automize:10.16</product> <product>automize:10.17</product> <product>automize:10.18</product> <product>automize:10.19</product> <product>automize:10.20</product> <product>automize:10.21</product> <product>automize:10.22</product> <product>automize:10.23</product> <product>automize:10.24</product> <product>automize:10.25</product> <product>automize:11.00</product> <product>automize:11.01</product> <product>automize:11.02</product> <product>automize:11.03</product> <product>automize:11.04</product> <product>automize:11.05</product> <product>automize:11.06</product> <product>automize:11.07</product> <product>automize:11.08</product> <product>automize:11.09</product> <product>automize:11.11</product> <product>automize:11.12</product> <product>automize:11.13</product> <product>automize:11.14</product> <product>automize:11.15</product> </cve> <cve id="CVE-2016-10100" level="LOW"> <product>borg:1.0.8</product> </cve> <cve id="CVE-2016-1217" level="MEDIUM"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-4381" level="MEDIUM"> <product>xp7_command_view:8.4.1</product> </cve> <cve id="CVE-2016-4380" level="MEDIUM"> <product>operations_manager:9.21</product> <product>operations_manager:9.21</product> <product>operations_manager:9.21</product> </cve> <cve id="CVE-2016-10369" level="LOW"> <product>lxterminal:0.3.0</product> </cve> <cve id="CVE-2016-10368" level="MEDIUM"> <product>opsview:4.5.0</product> <product>opsview:4.6.4</product> <product>opsview:5.0.2</product> <product>opsview:5.1.0</product> </cve> <cve id="CVE-2016-4385" level="LOW"> <product>network_automation:9.10</product> <product>network_automation:9.20</product> <product>network_automation:9.22</product> <product>network_automation:9.22.01</product> <product>network_automation:9.22.02</product> <product>network_automation:10.00</product> <product>network_automation:10.00.01</product> <product>network_automation:10.00.02</product> <product>network_automation:10.10</product> <product>network_automation:10.11</product> </cve> <cve id="CVE-2016-4384" level="LOW"> <product>loadrunner:12.02</product> <product>performance_center:12.20</product> </cve> <cve id="CVE-2016-4387" level="MEDIUM"> <product>keyview:10.18.0.0</product> <product>keyview:10.19.0.0</product> <product>keyview:10.20.0.0</product> <product>keyview:10.21.0.0</product> <product>keyview:10.22.0.0</product> <product>keyview:10.23.0.0</product> <product>keyview:10.24.0.0</product> </cve> <cve id="CVE-2016-4386" level="MEDIUM"> <product>network_automation:10.10</product> </cve> <cve id="CVE-2016-10363" level="LOW"> <product>logstash:2.3.2</product> </cve> <cve id="CVE-2016-10362" level="LOW"> <product>output_plugin:5.0.0</product> </cve> <cve id="CVE-2016-10367" level="LOW"> <product>opsview:4.5.0</product> <product>opsview:4.6.4</product> <product>opsview:5.0.2</product> <product>opsview:5.1.0</product> </cve> <cve id="CVE-2016-10366" level="MEDIUM"> <product>kibana:4.3.0</product> <product>kibana:4.3.1</product> <product>kibana:4.3.2</product> <product>kibana:4.3.3</product> <product>kibana:4.4.0</product> <product>kibana:4.4.1</product> <product>kibana:4.4.2</product> <product>kibana:4.5.0</product> <product>kibana:4.5.1</product> <product>kibana:4.5.2</product> <product>kibana:4.5.3</product> <product>kibana:4.5.4</product> <product>kibana:4.6.0</product> <product>kibana:4.6.1</product> </cve> <cve id="CVE-2016-10365" level="MEDIUM"> <product>kibana:4.6.2</product> <product>kibana:5.0.0</product> </cve> <cve id="CVE-2016-10364" level="LOW"> <product>kibana:5.0.0</product> <product>kibana:5.0.1</product> </cve> <cve id="CVE-2016-1449" level="MEDIUM"> <product>webex_meetings_server:2.6.0</product> <product>webex_meetings_server:2.6.1.39</product> </cve> <cve id="CVE-2016-1448" level="MEDIUM"> <product>webex_meetings_server:2.7.1</product> <product>webex_meetings_server:2.7_base</product> </cve> <cve id="CVE-2016-1445" level="MEDIUM"> <product>adaptive_security_appliance_software:8.2</product> <product>adaptive_security_appliance_software:8.2%281%29</product> <product>adaptive_security_appliance_software:8.2%282%29</product> <product>adaptive_security_appliance_software:8.2%283%29</product> <product>adaptive_security_appliance_software:8.2%283.9%29</product> <product>adaptive_security_appliance_software:8.2%284%29</product> <product>adaptive_security_appliance_software:8.2%284.1%29</product> <product>adaptive_security_appliance_software:8.2%284.4%29</product> <product>adaptive_security_appliance_software:8.2%285%29</product> <product>adaptive_security_appliance_software:8.2%285.35%29</product> <product>adaptive_security_appliance_software:8.2%285.38%29</product> <product>adaptive_security_appliance_software:8.2.1</product> <product>adaptive_security_appliance_software:8.2.1.11</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.3</product> <product>adaptive_security_appliance_software:8.2.5.52</product> <product>adaptive_security_appliance_software:8.2.5.55</product> <product>adaptive_security_appliance_software:8.2.5.57</product> <product>adaptive_security_appliance_software:8.3%281%29</product> <product>adaptive_security_appliance_software:8.3%282%29</product> <product>adaptive_security_appliance_software:8.3%282.34%29</product> <product>adaptive_security_appliance_software:8.3%282.37%29</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.2</product> <product>adaptive_security_appliance_software:8.3.2.44</product> <product>adaptive_security_appliance_software:8.4%28.2%29</product> <product>adaptive_security_appliance_software:8.4%28.2.1%29</product> <product>adaptive_security_appliance_software:8.4%28.2.8%29</product> <product>adaptive_security_appliance_software:8.4%28.3%29</product> <product>adaptive_security_appliance_software:8.4%28.3.8%29</product> <product>adaptive_security_appliance_software:8.4%28.3.9%29</product> <product>adaptive_security_appliance_software:8.4%28.4%29</product> <product>adaptive_security_appliance_software:8.4%28.4.1%29</product> <product>adaptive_security_appliance_software:8.4%28.4.3%29</product> <product>adaptive_security_appliance_software:8.4%28.4.5%29</product> <product>adaptive_security_appliance_software:8.4%28.4.9%29</product> <product>adaptive_security_appliance_software:8.4%28.5%29</product> <product>adaptive_security_appliance_software:8.4%28.5.6%29</product> <product>adaptive_security_appliance_software:8.4%28.6%29</product> <product>adaptive_security_appliance_software:8.4%28.7%29</product> <product>adaptive_security_appliance_software:8.4%28.7.3%29</product> <product>adaptive_security_appliance_software:8.4%28.7.15%29</product> <product>adaptive_security_appliance_software:8.4%281%29</product> <product>adaptive_security_appliance_software:8.4%281.11%29</product> <product>adaptive_security_appliance_software:8.4%282%29</product> <product>adaptive_security_appliance_software:8.4%282.11%29</product> <product>adaptive_security_appliance_software:8.4%283%29</product> <product>adaptive_security_appliance_software:8.4%284.11%29</product> <product>adaptive_security_appliance_software:8.4%285%29</product> <product>adaptive_security_appliance_software:8.4%286%29</product> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.5</product> <product>adaptive_security_appliance_software:8.5%281%29</product> <product>adaptive_security_appliance_software:8.5%281.4%29</product> <product>adaptive_security_appliance_software:8.5%281.17%29</product> <product>adaptive_security_appliance_software:8.6</product> <product>adaptive_security_appliance_software:8.6%281%29</product> <product>adaptive_security_appliance_software:8.6%281.2%29</product> <product>adaptive_security_appliance_software:8.6%281.3%29</product> <product>adaptive_security_appliance_software:8.6%281.10%29</product> <product>adaptive_security_appliance_software:8.7</product> <product>adaptive_security_appliance_software:8.7%281.1%29</product> <product>adaptive_security_appliance_software:8.7%281.3%29</product> <product>adaptive_security_appliance_software:8.7.1</product> <product>adaptive_security_appliance_software:8.7.1.1</product> <product>adaptive_security_appliance_software:8.7.1.3</product> <product>adaptive_security_appliance_software:8.7.1.8</product> <product>adaptive_security_appliance_software:8.7.1.17</product> <product>adaptive_security_appliance_software:9.0%28.3.6%29</product> <product>adaptive_security_appliance_software:9.0%28.3.8%29</product> <product>adaptive_security_appliance_software:9.0%28.4%29</product> <product>adaptive_security_appliance_software:9.0%28.4.1%29</product> <product>adaptive_security_appliance_software:9.0%281%29</product> <product>adaptive_security_appliance_software:9.0%282%29</product> <product>adaptive_security_appliance_software:9.0%283%29</product> <product>adaptive_security_appliance_software:9.0.3%286%29</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1</product> <product>adaptive_security_appliance_software:9.1%28.2%29</product> <product>adaptive_security_appliance_software:9.1%28.5%29</product> <product>adaptive_security_appliance_software:9.1%281%29</product> <product>adaptive_security_appliance_software:9.1%281.7%29</product> <product>adaptive_security_appliance_software:9.1%282%29</product> <product>adaptive_security_appliance_software:9.1%283%29</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.2%5c%280.0%5c%29</product> <product>adaptive_security_appliance_software:9.2%5c%280.104%5c%29</product> <product>adaptive_security_appliance_software:9.2%5c%283.1%5c%29</product> <product>adaptive_security_appliance_software:9.3%28.2%29</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3%283%29</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4%281%29</product> <product>adaptive_security_appliance_software:9.4%281.1%29</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.4.3.3</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> </cve> <cve id="CVE-2016-1444" level="MEDIUM"> <product>telepresence_video_communication_server:x8.1.1</product> <product>telepresence_video_communication_server:x8.1.2</product> <product>telepresence_video_communication_server:x8.1_base</product> <product>telepresence_video_communication_server:x8.2.1</product> <product>telepresence_video_communication_server:x8.2.2</product> <product>telepresence_video_communication_server:x8.2_base</product> <product>telepresence_video_communication_server:x8.5</product> <product>telepresence_video_communication_server:x8.5.0</product> <product>telepresence_video_communication_server:x8.5.1</product> <product>telepresence_video_communication_server:x8.5.2</product> <product>telepresence_video_communication_server:x8.5.3</product> <product>telepresence_video_communication_server:x8.6.0</product> <product>telepresence_video_communication_server:x8.6.1</product> <product>telepresence_video_communication_server:x8.7_base</product> <product>telepresence_video_communication_server_software:x8.5.1</product> <product>telepresence_video_communication_server_software:x8.5.2</product> <product>telepresence_video_communication_server_software:x8.5.3</product> <product>telepresence_video_communication_server_software:x8.6</product> </cve> <cve id="CVE-2016-1447" level="MEDIUM"> <product>webex_meetings_server:2.6.0</product> <product>webex_meetings_server:2.6.1.39</product> </cve> <cve id="CVE-2016-1446" level="LOW"> <product>webex_meetings_server:2.6.0</product> <product>webex_meetings_server:2.6.1.39</product> </cve> <cve id="CVE-2016-1441" level="LOW"> <product>cloud_network_automation_provisioner:1.0%280%29</product> </cve> <cve id="CVE-2016-1440" level="LOW"> <product>web_security_appliance:5.6.0-623</product> <product>web_security_appliance:6.0.0-000</product> <product>web_security_appliance:7.1.0</product> <product>web_security_appliance:7.1.1</product> <product>web_security_appliance:7.1.2</product> <product>web_security_appliance:7.1.3</product> <product>web_security_appliance:7.1.4</product> <product>web_security_appliance:7.5.0-000</product> <product>web_security_appliance:7.5.0-825</product> <product>web_security_appliance:7.5.1-000</product> <product>web_security_appliance:7.5.2-000</product> <product>web_security_appliance:7.5.2-hp2-303</product> <product>web_security_appliance:7.7.0-000</product> <product>web_security_appliance:7.7.0-608</product> <product>web_security_appliance:7.7.1-000</product> <product>web_security_appliance:7.7.5-835</product> <product>web_security_appliance:8.0.0-000</product> <product>web_security_appliance:8.0.5</product> <product>web_security_appliance:8.0.5_hp1</product> <product>web_security_appliance:8.0.6</product> <product>web_security_appliance:8.0.6-078</product> <product>web_security_appliance:8.0.6-119</product> <product>web_security_appliance:8.0.7</product> <product>web_security_appliance:8.0.7-142</product> <product>web_security_appliance:8.0.8-mr-113</product> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:8.5.0.000</product> <product>web_security_appliance:8.5.1-021</product> <product>web_security_appliance:8.5.2-024</product> <product>web_security_appliance:8.5.2-027</product> <product>web_security_appliance:8.5.3-055</product> <product>web_security_appliance:8.8.0-000</product> <product>web_security_appliance:8.8.0-085</product> <product>web_security_appliance:9.0.0-193</product> <product>web_security_appliance:9.0_base</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1.0-070</product> </cve> <cve id="CVE-2016-1443" level="MEDIUM"> <product>amp_threat_grid_appliance:1.0_base</product> <product>amp_threat_grid_appliance:1.1_base</product> <product>amp_threat_grid_appliance:1.2.1</product> <product>amp_threat_grid_appliance:1.2_base</product> <product>amp_threat_grid_appliance:1.3_base</product> <product>amp_threat_grid_appliance:1.4.1</product> <product>amp_threat_grid_appliance:1.4.2</product> <product>amp_threat_grid_appliance:1.4.3</product> <product>amp_threat_grid_appliance:1.4.4</product> <product>amp_threat_grid_appliance:1.4.5</product> <product>amp_threat_grid_appliance:1.4.6</product> <product>amp_threat_grid_appliance:1.4_base</product> <product>amp_threat_grid_appliance:2.0.1</product> <product>amp_threat_grid_appliance:2.0.2</product> <product>amp_threat_grid_appliance:2.0.3</product> <product>amp_threat_grid_appliance:2.0.4</product> <product>amp_threat_grid_appliance:2.0_base</product> <product>amp_threat_grid_appliance:2.1_base</product> </cve> <cve id="CVE-2016-1442" level="LOW"> <product>prime_infrastructure:3.0.0</product> <product>prime_infrastructure:3.0_base</product> <product>prime_infrastructure:3.1.0</product> </cve> <cve id="CVE-2016-1052" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1053" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-5383" level="LOW"> <product>cloudforms:4.1</product> </cve> <cve id="CVE-2016-1050" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-2387" level="MEDIUM"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-2386" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-1056" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-2389" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-2388" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-1054" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1055" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-3664" level="MEDIUM"> <product>mobile_security:3.1</product> </cve> <cve id="CVE-2016-5528" level="MEDIUM"> <product>glassfish_server:2.1.1</product> <product>glassfish_server:3.0.1</product> <product>glassfish_server:3.1.2</product> </cve> <cve id="CVE-2016-5529" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-5526" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5527" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5524" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5522" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5523" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5521" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-0921" level="MEDIUM"> <product>avamar_server:7.3.0</product> </cve> <cve id="CVE-2016-0920" level="LOW"> <product>avamar_server:7.3.0</product> </cve> <cve id="CVE-2016-0923" level="HIGH"> <product>rsa_bsafe:4.0.0</product> <product>rsa_bsafe:4.0.1</product> <product>rsa_bsafe:4.0.2</product> <product>rsa_bsafe:4.0.3</product> <product>rsa_bsafe:4.0.4</product> <product>rsa_bsafe:4.0.5</product> <product>rsa_bsafe:4.0.6</product> <product>rsa_bsafe:4.0.7</product> <product>rsa_bsafe:4.0.8</product> <product>rsa_bsafe:4.1.0</product> <product>rsa_bsafe:4.1.1</product> <product>rsa_bsafe:4.1.2</product> <product>rsa_bsafe:4.1.3</product> <product>rsa_bsafe:4.1.4</product> </cve> <cve id="CVE-2016-0922" level="LOW"> <product>vipr_srm:3.7.1</product> </cve> <cve id="CVE-2016-0925" level="MEDIUM"> <product>rsa_adaptive_authentication_on-premise:7.2</product> </cve> <cve id="CVE-2016-0927" level="MEDIUM"> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> </cve> <cve id="CVE-2016-0926" level="MEDIUM"> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> </cve> <cve id="CVE-2016-0929" level="LOW"> <product>rabbitmq:1.6.0</product> <product>rabbitmq:1.6.1</product> <product>rabbitmq:1.6.2</product> <product>rabbitmq:1.6.3</product> </cve> <cve id="CVE-2016-0928" level="MEDIUM"> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> </cve> <cve id="CVE-2016-10024" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen:4.8.0</product> </cve> <cve id="CVE-2016-10537" level="MEDIUM"> <product>backbone:0.3.3</product> </cve> <cve id="CVE-2016-10535" level="MEDIUM"> <product>csrf-lite:0.1.1</product> </cve> <cve id="CVE-2016-3366" level="MEDIUM"> <product>outlook:2007</product> <product>outlook:2010</product> <product>outlook:2013</product> <product>outlook:2016</product> <product>outlook_2013_rt:-</product> </cve> <cve id="CVE-2016-3367" level="MEDIUM"> <product>silverlight:5.0</product> </cve> <cve id="CVE-2016-3364" level="MEDIUM"> <product>visio:2016</product> </cve> <cve id="CVE-2016-3361" level="MEDIUM"> <product>excel:2010</product> </cve> <cve id="CVE-2016-8718" level="MEDIUM"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8719" level="MEDIUM"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8712" level="MEDIUM"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8713" level="MEDIUM"> <product>nitro_pro:10.5.5.9</product> </cve> <cve id="CVE-2016-8710" level="MEDIUM"> <product>libbpg:0.9.4</product> <product>libbpg:0.9.7</product> </cve> <cve id="CVE-2016-8711" level="MEDIUM"> <product>nitro_pro:10.5.9.9</product> </cve> <cve id="CVE-2016-8716" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8717" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8714" level="MEDIUM"> <product>r:3.3.0</product> <product>r:3.3.2</product> </cve> <cve id="CVE-2016-8715" level="MEDIUM"> <product>argus:6.6.05</product> </cve> <cve id="CVE-2016-0547" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> </cve> <cve id="CVE-2016-0545" level="LOW"> <product>customer_intelligence:11.5.10.2</product> <product>customer_intelligence:12.1.1</product> <product>customer_intelligence:12.1.2</product> <product>customer_intelligence:12.1.3</product> <product>customer_intelligence:12.2.3</product> <product>customer_intelligence:12.2.4</product> <product>customer_intelligence:12.2.5</product> </cve> <cve id="CVE-2016-0544" level="LOW"> <product>marketing:11.5.10.2</product> </cve> <cve id="CVE-2016-0543" level="LOW"> <product>marketing:11.5.10.2</product> </cve> <cve id="CVE-2016-0542" level="MEDIUM"> <product>field_service:12.1.1</product> <product>field_service:12.1.2</product> <product>field_service:12.1.3</product> <product>field_service:12.2.3</product> <product>field_service:12.2.4</product> <product>field_service:12.2.5</product> </cve> <cve id="CVE-2016-0541" level="LOW"> <product>configurator:11.5.10.2</product> <product>configurator:12.1</product> <product>configurator:12.2</product> </cve> <cve id="CVE-2016-0540" level="LOW"> <product>configurator:11.5.10.2</product> <product>configurator:12.1</product> <product>configurator:12.2</product> </cve> <cve id="CVE-2016-0549" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> </cve> <cve id="CVE-2016-0548" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> </cve> <cve id="CVE-2016-1140" level="MEDIUM"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-1141" level="LOW"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-1142" level="LOW"> <product>acmailer:3.8.20</product> <product>acmailer:3.9.14</product> </cve> <cve id="CVE-2016-1143" level="MEDIUM"> <product>vine_mv:2015-09-09</product> </cve> <cve id="CVE-2016-1144" level="MEDIUM"> <product>job_web_system:1.0.6</product> <product>job_web_system:1.2.1</product> </cve> <cve id="CVE-2016-1145" level="LOW"> <product>expresscluster_x:3.3</product> <product>expresscluster_x:3.3</product> </cve> <cve id="CVE-2016-4467" level="MEDIUM"> <product>qpid_proton:0.8.0</product> <product>qpid_proton:0.9.0</product> <product>qpid_proton:0.9.1</product> <product>qpid_proton:0.10.0</product> <product>qpid_proton:0.11.0</product> <product>qpid_proton:0.11.1</product> <product>qpid_proton:0.12.0</product> <product>qpid_proton:0.12.1</product> <product>qpid_proton:0.12.2</product> <product>qpid_proton:0.13.0</product> </cve> <cve id="CVE-2016-1148" level="MEDIUM"> <product>smart_lock_robot:1.2.3</product> </cve> <cve id="CVE-2016-4469" level="MEDIUM"> <product>archiva:1.3.9</product> </cve> <cve id="CVE-2016-9150" level="LOW"> <product>pan-os:5.0.19</product> <product>pan-os:5.1.12</product> <product>pan-os:6.0.14</product> <product>pan-os:6.1.14</product> <product>pan-os:7.0.10</product> <product>pan-os:7.1.5</product> </cve> <cve id="CVE-2016-7843" level="MEDIUM"> <product>attachecase_for_java:0.6.0</product> <product>attachecase_lite:1.4.6</product> <product>attachecase_pro:1.5.7</product> </cve> <cve id="CVE-2016-7842" level="MEDIUM"> <product>attachecase:2.8.2.8</product> <product>attachecase:3.2.0.4</product> </cve> <cve id="CVE-2016-7841" level="MEDIUM"> <product>olive_diary_dx:-</product> </cve> <cve id="CVE-2016-7840" level="MEDIUM"> <product>olive_blog:-</product> </cve> <cve id="CVE-2016-7845" level="LOW"> <product>gigacc_office:2.3</product> </cve> <cve id="CVE-2016-7844" level="MEDIUM"> <product>gigacc_office:2.3</product> </cve> <cve id="CVE-2016-9445" level="LOW"> <product>gstreamer_plugin:1.10</product> </cve> <cve id="CVE-2016-9444" level="LOW"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> </cve> <cve id="CVE-2016-9447" level="MEDIUM"> <product>gstreamer:0.10.0</product> <product>gstreamer:0.10.1</product> <product>gstreamer:0.10.2</product> <product>gstreamer:0.10.3</product> <product>gstreamer:0.10.4</product> <product>gstreamer:0.10.5</product> <product>gstreamer:0.10.6</product> <product>gstreamer:0.10.7</product> <product>gstreamer:0.10.8</product> <product>gstreamer:0.10.9</product> <product>gstreamer:0.10.10</product> <product>gstreamer:0.10.11</product> <product>gstreamer:0.10.12</product> <product>gstreamer:0.10.13</product> <product>gstreamer:0.10.14</product> <product>gstreamer:0.10.15</product> <product>gstreamer:0.10.16</product> <product>gstreamer:0.10.17</product> <product>gstreamer:0.10.18</product> <product>gstreamer:0.10.19</product> <product>gstreamer:0.10.20</product> <product>gstreamer:0.10.21</product> <product>gstreamer:0.10.22</product> <product>gstreamer:0.10.23</product> <product>gstreamer:0.10.24</product> <product>gstreamer:0.10.25</product> <product>gstreamer:0.10.26</product> <product>gstreamer:0.10.27</product> <product>gstreamer:0.10.28</product> <product>gstreamer:0.10.29</product> <product>gstreamer:0.10.30</product> <product>gstreamer:0.10.31</product> <product>gstreamer:0.10.32</product> <product>gstreamer:0.10.33</product> <product>gstreamer:0.10.34</product> <product>gstreamer:0.10.35</product> <product>gstreamer:0.10.36</product> </cve> <cve id="CVE-2016-9446" level="LOW"> <product>gstreamer</product> </cve> <cve id="CVE-2016-9441" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9440" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9443" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9442" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9993" level="LOW"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-9992" level="LOW"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-9991" level="MEDIUM"> <product>sterling_selling_and_fulfillment_foundation:9.2.0</product> <product>sterling_selling_and_fulfillment_foundation:9.2.1</product> <product>sterling_selling_and_fulfillment_foundation:9.3.0</product> <product>sterling_selling_and_fulfillment_foundation:9.4.0</product> <product>sterling_selling_and_fulfillment_foundation:9.5.0</product> </cve> <cve id="CVE-2016-9990" level="MEDIUM"> <product>inotes:8.5.0.0</product> <product>inotes:8.5.0.1</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-9449" level="LOW"> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.1</product> <product>drupal:7.2</product> <product>drupal:7.3</product> <product>drupal:7.4</product> <product>drupal:7.10</product> <product>drupal:7.11</product> <product>drupal:7.12</product> <product>drupal:7.13</product> <product>drupal:7.14</product> <product>drupal:7.15</product> <product>drupal:7.16</product> <product>drupal:7.17</product> <product>drupal:7.18</product> <product>drupal:7.19</product> <product>drupal:7.20</product> <product>drupal:7.21</product> <product>drupal:7.22</product> <product>drupal:7.23</product> <product>drupal:7.24</product> <product>drupal:7.25</product> <product>drupal:7.26</product> <product>drupal:7.27</product> <product>drupal:7.28</product> <product>drupal:7.29</product> <product>drupal:7.30</product> <product>drupal:7.31</product> <product>drupal:7.32</product> <product>drupal:7.33</product> <product>drupal:7.34</product> <product>drupal:7.35</product> <product>drupal:7.36</product> <product>drupal:7.37</product> <product>drupal:7.38</product> <product>drupal:7.40</product> <product>drupal:7.41</product> <product>drupal:7.42</product> <product>drupal:7.43</product> <product>drupal:7.44</product> <product>drupal:7.50</product> <product>drupal:7.51</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> <product>drupal:8.1.10</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.1</product> <product>drupal:8.2.2</product> </cve> <cve id="CVE-2016-9448" level="LOW"> <product>libtiff:4.0.6</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9994" level="LOW"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> </cve> <cve id="CVE-2016-5733" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5732" level="MEDIUM"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> </cve> <cve id="CVE-2016-5731" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5730" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5737" level="MEDIUM"> <product>puppet-gerrit:-</product> </cve> <cve id="CVE-2016-5736" level="LOW"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-5735" level="MEDIUM"> <product>pngquant:2.7.0</product> </cve> <cve id="CVE-2016-5734" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> </cve> <cve id="CVE-2016-5739" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9193" level="LOW"> <product>firepower_management_center:6.0.0</product> <product>firepower_management_center:6.0.0.0</product> <product>firepower_management_center:6.0.0.1</product> <product>firepower_management_center:6.0.1</product> <product>firepower_management_center:6.0.1.1</product> <product>firepower_management_center:6.1.0</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> <product>firesight_system_software:6.0.1.1</product> <product>firesight_system_software:6.1.0</product> </cve> <cve id="CVE-2016-9192" level="LOW"> <product>anyconnect_secure_mobility_client:3.1%2860%29</product> <product>anyconnect_secure_mobility_client:3.1.0</product> <product>anyconnect_secure_mobility_client:3.1.02043</product> <product>anyconnect_secure_mobility_client:3.1.05182</product> <product>anyconnect_secure_mobility_client:3.1.05187</product> <product>anyconnect_secure_mobility_client:3.1.06073</product> <product>anyconnect_secure_mobility_client:3.1.07021</product> <product>anyconnect_secure_mobility_client:4.0%2848%29</product> <product>anyconnect_secure_mobility_client:4.0%2864%29</product> <product>anyconnect_secure_mobility_client:4.0%282049%29</product> <product>anyconnect_secure_mobility_client:4.0.0</product> <product>anyconnect_secure_mobility_client:4.0.00048</product> <product>anyconnect_secure_mobility_client:4.0.00051</product> <product>anyconnect_secure_mobility_client:4.1%288%29</product> <product>anyconnect_secure_mobility_client:4.1.0</product> <product>anyconnect_secure_mobility_client:4.2.0</product> <product>anyconnect_secure_mobility_client:4.2.04039</product> <product>anyconnect_secure_mobility_client:4.3.0</product> <product>anyconnect_secure_mobility_client:4.3.00748</product> <product>anyconnect_secure_mobility_client:4.3.01095</product> </cve> <cve id="CVE-2016-9197" level="LOW"> <product>mobility_services_engine:8.3.102.0</product> </cve> <cve id="CVE-2016-9196" level="LOW"> <product>aironet_access_point:8.1%2815.14%29</product> <product>aironet_access_point:8.1%28112.3%29</product> <product>aironet_access_point:8.1%28112.4%29</product> <product>aironet_access_point:8.1%28131.0%29</product> <product>aironet_access_point:8.2%28100.0%29</product> <product>aironet_access_point:8.2%28102.43%29</product> <product>aironet_access_point:8.2_base</product> </cve> <cve id="CVE-2016-9195" level="LOW"> <product>wireless_lan_controller:8.3.102.0</product> </cve> <cve id="CVE-2016-9194" level="LOW"> <product>wireless_lan_controller:5.2.157.0</product> <product>wireless_lan_controller:5.2.169.0</product> <product>wireless_lan_controller:6.0_base</product> <product>wireless_lan_controller:7.0_base</product> <product>wireless_lan_controller:7.1_base</product> <product>wireless_lan_controller:7.2_base</product> <product>wireless_lan_controller:7.3.101.0</product> <product>wireless_lan_controller:7.3.103.8</product> <product>wireless_lan_controller:7.3.112</product> <product>wireless_lan_controller:7.3_base</product> <product>wireless_lan_controller:7.4.1.1</product> <product>wireless_lan_controller:7.4.100</product> <product>wireless_lan_controller:7.4.100.60</product> <product>wireless_lan_controller:7.4.110.0</product> <product>wireless_lan_controller:7.4.121.0</product> <product>wireless_lan_controller:7.4_base</product> <product>wireless_lan_controller:7.5.102.0</product> <product>wireless_lan_controller:7.5.102.11</product> <product>wireless_lan_controller:7.5_base</product> <product>wireless_lan_controller:7.6.1.62</product> <product>wireless_lan_controller:7.6.100.0</product> <product>wireless_lan_controller:7.6.110.0</product> <product>wireless_lan_controller:7.6.120.0</product> <product>wireless_lan_controller:7.6.130.0</product> <product>wireless_lan_controller:8.0.0</product> <product>wireless_lan_controller:8.0.0.30220.385</product> <product>wireless_lan_controller:8.0.72.140</product> <product>wireless_lan_controller:8.0.100</product> <product>wireless_lan_controller:8.0.115.0</product> <product>wireless_lan_controller:8.0.120.0</product> <product>wireless_lan_controller:8.0.121.0</product> <product>wireless_lan_controller:8.1.0</product> <product>wireless_lan_controller:8.1.104.37</product> <product>wireless_lan_controller:8.1.111.0</product> <product>wireless_lan_controller:8.1.122.0</product> <product>wireless_lan_controller:8.1.130.0</product> <product>wireless_lan_controller_6.0:182.0</product> <product>wireless_lan_controller_6.0:188.0</product> <product>wireless_lan_controller_6.0:196.0</product> <product>wireless_lan_controller_6.0:199.4</product> <product>wireless_lan_controller_6.0:202.0</product> <product>wireless_lan_controller_7.0:98.0</product> <product>wireless_lan_controller_7.0:98.218</product> <product>wireless_lan_controller_7.0:116.0</product> <product>wireless_lan_controller_7.0:220.0</product> <product>wireless_lan_controller_7.0:240.0</product> <product>wireless_lan_controller_7.0:250.0</product> <product>wireless_lan_controller_7.0:252.0</product> <product>wireless_lan_controller_7.1:91.0</product> <product>wireless_lan_controller_7.2:103.0</product> <product>wireless_lan_controller_7.4:1.19</product> <product>wireless_lan_controller_7.4:1.54</product> <product>wireless_lan_controller_7.4:140.0</product> </cve> <cve id="CVE-2016-9199" level="LOW"> <product>iox:1.1.0</product> </cve> <cve id="CVE-2016-9198" level="LOW"> <product>identity_services_engine:1.2%281.199%29</product> </cve> <cve id="CVE-2016-10676" level="MEDIUM"> <product>rs-brightcove:0.0.2</product> </cve> <cve id="CVE-2016-1057" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-2170" level="LOW"> <product>ofbiz:12.04.01</product> <product>ofbiz:12.04.02</product> <product>ofbiz:12.04.03</product> <product>ofbiz:12.04.04</product> <product>ofbiz:12.04.05</product> <product>ofbiz:13.07.01</product> <product>ofbiz:13.07.02</product> </cve> <cve id="CVE-2016-2171" level="LOW"> <product>jetspeed:2.3.0</product> </cve> <cve id="CVE-2016-2173" level="LOW"> <product>spring-amqp:1.5.4</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-2174" level="LOW"> <product>ranger:0.5.0</product> <product>ranger:0.5.1</product> <product>ranger:0.5.2</product> </cve> <cve id="CVE-2016-2176" level="LOW"> <product>openssl:1.0.1s</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>openssl:1.0.2g</product> </cve> <cve id="CVE-2016-0469" level="LOW"> <product>micros_c2:9.89.0.0</product> </cve> <cve id="CVE-2016-3173" level="MEDIUM"> <product>open-xchange_appsuite:7.8.0</product> </cve> <cve id="CVE-2016-3172" level="LOW"> <product>cacti:0.8.8g</product> </cve> <cve id="CVE-2016-6411" level="LOW"> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-3177" level="LOW"> <product>giflib:5.1.2</product> </cve> <cve id="CVE-2016-3176" level="MEDIUM"> <product>salt:2015.5.9</product> <product>salt:2015.8.0</product> <product>salt:2015.8.1</product> <product>salt:2015.8.2</product> <product>salt:2015.8.3</product> <product>salt:2015.8.4</product> <product>salt:2015.8.5</product> <product>salt:2015.8.7</product> </cve> <cve id="CVE-2016-3174" level="MEDIUM"> <product>open-xchange_appsuite:7.8.0</product> </cve> <cve id="CVE-2016-3179" level="LOW"> <product>minisspd:1.2.20130907-3</product> </cve> <cve id="CVE-2016-3178" level="LOW"> <product>minisspd:1.2.20130907-3</product> </cve> <cve id="CVE-2016-1993" level="LOW"> <product>system_management_homepage:7.5.3.1</product> </cve> <cve id="CVE-2016-1992" level="LOW"> <product>enterprise_security_manager:6.8</product> <product>enterprise_security_manager_express:6.9.0</product> </cve> <cve id="CVE-2016-1991" level="MEDIUM"> <product>arcsight_enterprise_security_manager:5.6</product> <product>arcsight_enterprise_security_manager:6.0</product> <product>arcsight_enterprise_security_manager:6.5</product> <product>arcsight_enterprise_security_manager:6.8</product> <product>arcsight_enterprise_security_manager:6.9</product> </cve> <cve id="CVE-2016-1990" level="LOW"> <product>arcsight_enterprise_security_manager:5.6</product> <product>arcsight_enterprise_security_manager:6.0</product> <product>arcsight_enterprise_security_manager:6.5</product> <product>arcsight_enterprise_security_manager:6.8</product> <product>arcsight_enterprise_security_manager:6.9</product> </cve> <cve id="CVE-2016-1997" level="LOW"> <product>operations_orchestration:10.0</product> <product>operations_orchestration:10.01</product> <product>operations_orchestration:10.02</product> <product>operations_orchestration:10.10</product> <product>operations_orchestration:10.20</product> <product>operations_orchestration:10.21</product> <product>operations_orchestration:10.22</product> <product>operations_orchestration:10.22.1</product> <product>operations_orchestration:10.50</product> <product>operations_orchestration_content:1.5.3</product> </cve> <cve id="CVE-2016-1996" level="LOW"> <product>system_management_homepage:7.5.3.1</product> </cve> <cve id="CVE-2016-1995" level="LOW"> <product>system_management_homepage:7.5.3.1</product> </cve> <cve id="CVE-2016-1994" level="LOW"> <product>system_management_homepage:7.5.3.1</product> </cve> <cve id="CVE-2016-0460" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-1999" level="LOW"> <product>release_control:9.13</product> <product>release_control:9.20</product> <product>release_control:9.21</product> </cve> <cve id="CVE-2016-1998" level="LOW"> <product>service_manager:9.30</product> <product>service_manager:9.31</product> <product>service_manager:9.32</product> <product>service_manager:9.33</product> <product>service_manager:9.34</product> <product>service_manager:9.35</product> <product>service_manager:9.40</product> <product>service_manager:9.41</product> </cve> <cve id="CVE-2016-1229" level="MEDIUM"> <product>humhub:0.20.0</product> <product>humhub:0.20.0</product> <product>humhub:0.20.0</product> <product>humhub:0.20.1</product> <product>humhub:1.0.0</product> <product>humhub:1.0.0</product> </cve> <cve id="CVE-2016-1221" level="MEDIUM"> <product>jetstar:2.4.1</product> </cve> <cve id="CVE-2016-1220" level="LOW"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-0158" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-0159" level="HIGH"> <product>internet_explorer:9</product> </cve> <cve id="CVE-2016-0154" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0155" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-0156" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-0157" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-1224" level="MEDIUM"> <product>business_security:9.0</product> <product>business_security_services:5.0</product> </cve> <cve id="CVE-2016-0482" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0480" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0481" level="LOW"> <product>enterprise_manager_grid_control:12.4.0.2</product> <product>enterprise_manager_grid_control:12.5.0.2</product> </cve> <cve id="CVE-2016-0486" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0487" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0484" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0485" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0488" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0489" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-4819" level="LOW"> <product>dx_library:3.16b</product> <product>dx_library:3.16b</product> <product>dx_library:3.16b</product> </cve> <cve id="CVE-2016-4818" level="MEDIUM"> <product>dmmfx_demo_trade:1.5.0</product> <product>dmmfx_trade:1.5.0</product> <product>gaitamejapan_fx_trade:1.4.0</product> </cve> <cve id="CVE-2016-4811" level="HIGH"> <product>japan_connected-free_wi-fi:1.13.0</product> <product>japan_connected-free_wi-fi:1.15.1</product> </cve> <cve id="CVE-2016-4810" level="LOW"> <product>xenapp:7.5</product> <product>xenapp:7.6</product> <product>xendesktop:7.0</product> <product>xendesktop:7.1</product> <product>xendesktop:7.5</product> <product>xendesktop:7.6</product> <product>xendesktop:7.6</product> <product>xendesktop:7.6</product> <product>xendesktop:7.6</product> <product>xendesktop:7.6</product> </cve> <cve id="CVE-2016-4813" level="LOW"> <product>netcommons:2.4.2.1</product> </cve> <cve id="CVE-2016-4812" level="MEDIUM"> <product>markdown_on_saved_improved:2.5</product> </cve> <cve id="CVE-2016-4815" level="LOW"> <product>wzr-600dhp2_firmware:1.13</product> <product>wzr-600dhp3_firmware:2.16</product> <product>wzr-900dhp2_firmware:2.16</product> <product>wzr-900dhp_firmware:1.11</product> <product>wzr-s600dhp_firmware:2.16</product> <product>wzr-s900dhp_firmware:2.16</product> </cve> <cve id="CVE-2016-4814" level="LOW"> <product>old_gsi_maps:-</product> </cve> <cve id="CVE-2016-4817" level="LOW"> <product>h2o:1.7.2</product> <product>h2o:2.0.0</product> </cve> <cve id="CVE-2016-4816" level="MEDIUM"> <product>bhr-4grv_firmware:1.96</product> <product>dwr-hp-g300nh_firmware:1.81</product> <product>fs-600dhp_firmware:3.34</product> <product>hw-450hp-zwe_firmware:1.91</product> <product>wapm-ag300n_firmware:2.62</product> <product>wapm-apg300n_firmware:2.62</product> <product>wcr-300_firmware:1.86</product> <product>whr-300_firmware:1.96</product> <product>whr-300hp_firmware:1.96</product> <product>whr-hp-g300n_firmware:1.96</product> <product>wpl-05g300_firmware:1.86</product> <product>wxr-1750dhp_firmware:2.42</product> <product>wxr-1900dhp_firmware:2.34</product> <product>wzr-1166dhp2_firmware:2.13</product> <product>wzr-1166dhp_firmware:2.13</product> <product>wzr-1750dhp2_firmware:2.28</product> <product>wzr-1750dhp_firmware:2.28</product> <product>wzr-300hp_firmware:1.96</product> <product>wzr-450hp-cwt_firmware:1.92</product> <product>wzr-450hp-ub_firmware:1.96</product> <product>wzr-450hp_firmware:1.97</product> <product>wzr-600dhp3_firmware:2.16</product> <product>wzr-600dhp_firmware:1.97</product> <product>wzr-900dhp2_firmware:1.13</product> <product>wzr-900dhp2_firmware:2.16</product> <product>wzr-900dhp_firmware:1.11</product> <product>wzr-d1100h_firmware:1.96</product> <product>wzr-hp-ag300h_firmware:1.73</product> <product>wzr-hp-g300nh_firmware:1.81</product> <product>wzr-hp-g301nh_firmware:1.81</product> <product>wzr-hp-g302h_firmware:1.83</product> <product>wzr-hp-g450h_firmware:1.87</product> <product>wzr-s1750dhp_firmware:2.28</product> <product>wzr-s600dhp_firmware:2.16</product> <product>wzr-s900dhp_firmware:2.16</product> </cve> <cve id="CVE-2016-3289" level="HIGH"> <product>edge</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3288" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-6670" level="LOW"> <product>s7700_firmware:v200r003c00</product> <product>s7700_firmware:v200r005c00</product> <product>s9300_firmware:v200r003c00</product> <product>s9300_firmware:v200r005c00</product> <product>s9700_firmware:v200r003c00</product> <product>s9700_firmware:v200r005c00</product> <product>s12700:v200r005c00</product> </cve> <cve id="CVE-2016-0738" level="LOW"> <product>swift:2.3.0</product> <product>swift:2.4.0</product> <product>swift:2.5.0</product> </cve> <cve id="CVE-2016-7108" level="LOW"> <product>uma:v200r001c00spc200</product> </cve> <cve id="CVE-2016-7109" level="LOW"> <product>uma:v200r001c00spc100</product> </cve> <cve id="CVE-2016-7107" level="LOW"> <product>uma:v200r001c00spc200</product> </cve> <cve id="CVE-2016-0732" level="LOW"> <product>cloud_foundry:208</product> <product>cloud_foundry:229</product> <product>elastic_runtime:1.6.0</product> <product>elastic_runtime:1.6.1</product> <product>elastic_runtime:1.6.2</product> <product>elastic_runtime:1.6.3</product> <product>elastic_runtime:1.6.4</product> <product>elastic_runtime:1.6.5</product> <product>elastic_runtime:1.6.6</product> <product>elastic_runtime:1.6.7</product> <product>elastic_runtime:1.6.8</product> <product>elastic_runtime:1.6.9</product> <product>elastic_runtime:1.6.10</product> <product>elastic_runtime:1.6.11</product> <product>elastic_runtime:1.6.12</product> <product>elastic_runtime:1.6.13</product> <product>uaa:2.0.0</product> <product>uaa:2.0.1</product> <product>uaa:2.0.2</product> <product>uaa:2.0.3</product> <product>uaa:2.1.0</product> <product>uaa:2.2.0</product> <product>uaa:2.2.1</product> <product>uaa:2.2.2</product> <product>uaa:2.2.3</product> <product>uaa:2.2.4</product> <product>uaa:2.2.4.1</product> <product>uaa:2.2.5</product> <product>uaa:2.2.5.2</product> <product>uaa:2.2.5.3</product> <product>uaa:2.2.6</product> <product>uaa:2.3.0</product> <product>uaa:2.3.1</product> <product>uaa:2.3.1.1</product> <product>uaa:2.4.0</product> <product>uaa:2.4.1</product> <product>uaa:2.5.0</product> <product>uaa:2.5.1</product> <product>uaa:2.5.2</product> <product>uaa:2.6.0</product> <product>uaa:2.6.1</product> <product>uaa:2.6.2</product> <product>uaa:2.7.0</product> <product>uaa:2.7.0.1</product> <product>uaa:2.7.0.2</product> <product>uaa:2.7.0.3</product> <product>uaa:2.7.1</product> <product>uaa:2.7.2</product> <product>uaa:2.7.3</product> <product>uaa-release:2</product> <product>uaa-release:3</product> <product>uaa-release:4</product> </cve> <cve id="CVE-2016-0733" level="LOW"> <product>ranger:0.5.0</product> </cve> <cve id="CVE-2016-0734" level="MEDIUM"> <product>activemq:5.0.0</product> <product>activemq:5.1.0</product> <product>activemq:5.2.0</product> <product>activemq:5.3.0</product> <product>activemq:5.3.1</product> <product>activemq:5.3.2</product> <product>activemq:5.4.0</product> <product>activemq:5.4.1</product> <product>activemq:5.4.2</product> <product>activemq:5.4.3</product> <product>activemq:5.5.0</product> <product>activemq:5.5.1</product> <product>activemq:5.6.0</product> <product>activemq:5.7.0</product> <product>activemq:5.8.0</product> <product>activemq:5.9.0</product> <product>activemq:5.9.1</product> <product>activemq:5.10.0</product> <product>activemq:5.10.1</product> <product>activemq:5.10.2</product> <product>activemq:5.11.0</product> <product>activemq:5.11.1</product> <product>activemq:5.11.2</product> <product>activemq:5.12.0</product> <product>activemq:5.12.1</product> <product>activemq:5.12.2</product> <product>activemq:5.13.0</product> </cve> <cve id="CVE-2016-0735" level="LOW"> <product>ranger:0.5.0</product> <product>ranger:0.5.1</product> </cve> <cve id="CVE-2016-0737" level="LOW"> <product>swift:2.3.0</product> </cve> <cve id="CVE-2016-9858" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9859" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-1919" level="MEDIUM"> <product>knox:1.0</product> </cve> <cve id="CVE-2016-9852" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9853" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9850" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9851" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9856" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9857" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9854" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9855" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-10169" level="MEDIUM"> <product>wavpack:5.0.0</product> </cve> <cve id="CVE-2016-10168" level="MEDIUM"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-2971" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-10163" level="LOW"> <product>virglrenderer:0.5.0</product> </cve> <cve id="CVE-2016-10164" level="LOW"> <product>libxpm:3.5.11</product> </cve> <cve id="CVE-2016-10167" level="MEDIUM"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-10166" level="LOW"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-6912" level="LOW"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-9086" level="LOW"> <product>gitlab:8.9.0</product> <product>gitlab:8.9.1</product> <product>gitlab:8.9.2</product> <product>gitlab:8.9.3</product> <product>gitlab:8.9.4</product> <product>gitlab:8.9.5</product> <product>gitlab:8.9.6</product> <product>gitlab:8.9.7</product> <product>gitlab:8.9.8</product> <product>gitlab:8.9.9</product> <product>gitlab:8.9.10</product> <product>gitlab:8.9.11</product> <product>gitlab:8.10.0</product> <product>gitlab:8.10.1</product> <product>gitlab:8.10.2</product> <product>gitlab:8.10.3</product> <product>gitlab:8.10.4</product> <product>gitlab:8.10.5</product> <product>gitlab:8.10.6</product> <product>gitlab:8.10.7</product> <product>gitlab:8.10.8</product> <product>gitlab:8.10.9</product> <product>gitlab:8.10.10</product> <product>gitlab:8.10.11</product> <product>gitlab:8.10.12</product> <product>gitlab:8.11.0</product> <product>gitlab:8.11.1</product> <product>gitlab:8.11.2</product> <product>gitlab:8.11.3</product> <product>gitlab:8.11.4</product> <product>gitlab:8.11.5</product> <product>gitlab:8.11.6</product> <product>gitlab:8.11.7</product> <product>gitlab:8.11.8</product> <product>gitlab:8.11.9</product> <product>gitlab:8.12.0</product> <product>gitlab:8.12.1</product> <product>gitlab:8.12.2</product> <product>gitlab:8.12.3</product> <product>gitlab:8.12.4</product> <product>gitlab:8.12.5</product> <product>gitlab:8.12.6</product> <product>gitlab:8.12.7</product> <product>gitlab:8.13.0</product> <product>gitlab:8.13.1</product> <product>gitlab:8.13.2</product> </cve> <cve id="CVE-2016-6913" level="MEDIUM"> <product>open_source_security_information_and_event_management:5.2</product> <product>unified_security_management:5.2</product> </cve> <cve id="CVE-2016-2974" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-6911" level="MEDIUM"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-6916" level="LOW"> <product>video_driver:-</product> <product>shield_tablet_firmware:4.3.0</product> <product>shield_tablet_tk1_firmware:1.4.0</product> <product>shield_tv_firmware:3.2</product> </cve> <cve id="CVE-2016-2977" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-9924" level="LOW"> <product>zimbra_collaboration_suite:8.7.3</product> </cve> <cve id="CVE-2016-3437" level="MEDIUM"> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-3434" level="MEDIUM"> <product>application_object_library:12.1.3</product> <product>application_object_library:12.2.3</product> <product>application_object_library:12.2.4</product> <product>application_object_library:12.2.5</product> </cve> <cve id="CVE-2016-1289" level="LOW"> <product>evolved_programmable_network_manager:1.2.0</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2%282%29</product> <product>prime_infrastructure:2.2.0</product> </cve> <cve id="CVE-2016-1288" level="LOW"> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:9.0.0-193</product> </cve> <cve id="CVE-2016-1287" level="LOW"> <product>adaptive_security_appliance_software:7.2.1</product> <product>adaptive_security_appliance_software:7.2.1.9</product> <product>adaptive_security_appliance_software:7.2.1.13</product> <product>adaptive_security_appliance_software:7.2.1.19</product> <product>adaptive_security_appliance_software:7.2.1.24</product> <product>adaptive_security_appliance_software:7.2.2</product> <product>adaptive_security_appliance_software:7.2.2.6</product> <product>adaptive_security_appliance_software:7.2.2.10</product> <product>adaptive_security_appliance_software:7.2.2.14</product> <product>adaptive_security_appliance_software:7.2.2.18</product> <product>adaptive_security_appliance_software:7.2.2.19</product> <product>adaptive_security_appliance_software:7.2.2.22</product> <product>adaptive_security_appliance_software:7.2.2.34</product> <product>adaptive_security_appliance_software:7.2.3</product> <product>adaptive_security_appliance_software:7.2.3.1</product> <product>adaptive_security_appliance_software:7.2.3.12</product> <product>adaptive_security_appliance_software:7.2.3.16</product> <product>adaptive_security_appliance_software:7.2.4</product> <product>adaptive_security_appliance_software:7.2.4.6</product> <product>adaptive_security_appliance_software:7.2.4.9</product> <product>adaptive_security_appliance_software:7.2.4.18</product> <product>adaptive_security_appliance_software:7.2.4.25</product> <product>adaptive_security_appliance_software:7.2.4.27</product> <product>adaptive_security_appliance_software:7.2.4.30</product> <product>adaptive_security_appliance_software:7.2.4.33</product> <product>adaptive_security_appliance_software:7.2.5</product> <product>adaptive_security_appliance_software:7.2.5.2</product> <product>adaptive_security_appliance_software:7.2.5.4</product> <product>adaptive_security_appliance_software:7.2.5.7</product> <product>adaptive_security_appliance_software:7.2.5.8</product> <product>adaptive_security_appliance_software:7.2.5.10</product> <product>adaptive_security_appliance_software:7.2.5.12</product> <product>adaptive_security_appliance_software:7.2.5.16</product> <product>adaptive_security_appliance_software:8.2.0.45</product> <product>adaptive_security_appliance_software:8.2.1</product> <product>adaptive_security_appliance_software:8.2.1.11</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.2.9</product> <product>adaptive_security_appliance_software:8.2.2.10</product> <product>adaptive_security_appliance_software:8.2.2.12</product> <product>adaptive_security_appliance_software:8.2.2.16</product> <product>adaptive_security_appliance_software:8.2.2.17</product> <product>adaptive_security_appliance_software:8.2.3</product> <product>adaptive_security_appliance_software:8.2.4</product> <product>adaptive_security_appliance_software:8.2.4.1</product> <product>adaptive_security_appliance_software:8.2.4.4</product> <product>adaptive_security_appliance_software:8.2.5</product> <product>adaptive_security_appliance_software:8.2.5.13</product> <product>adaptive_security_appliance_software:8.2.5.22</product> <product>adaptive_security_appliance_software:8.2.5.26</product> <product>adaptive_security_appliance_software:8.2.5.33</product> <product>adaptive_security_appliance_software:8.2.5.40</product> <product>adaptive_security_appliance_software:8.2.5.41</product> <product>adaptive_security_appliance_software:8.2.5.46</product> <product>adaptive_security_appliance_software:8.2.5.48</product> <product>adaptive_security_appliance_software:8.2.5.50</product> <product>adaptive_security_appliance_software:8.2.5.52</product> <product>adaptive_security_appliance_software:8.2.5.55</product> <product>adaptive_security_appliance_software:8.2.5.57</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.1.1</product> <product>adaptive_security_appliance_software:8.3.1.4</product> <product>adaptive_security_appliance_software:8.3.1.6</product> <product>adaptive_security_appliance_software:8.3.2</product> <product>adaptive_security_appliance_software:8.3.2.4</product> <product>adaptive_security_appliance_software:8.3.2.13</product> <product>adaptive_security_appliance_software:8.3.2.23</product> <product>adaptive_security_appliance_software:8.3.2.25</product> <product>adaptive_security_appliance_software:8.3.2.31</product> <product>adaptive_security_appliance_software:8.3.2.33</product> <product>adaptive_security_appliance_software:8.3.2.34</product> <product>adaptive_security_appliance_software:8.3.2.37</product> <product>adaptive_security_appliance_software:8.3.2.39</product> <product>adaptive_security_appliance_software:8.3.2.40</product> <product>adaptive_security_appliance_software:8.3.2.41</product> <product>adaptive_security_appliance_software:8.3.2.44</product> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.5.1</product> <product>adaptive_security_appliance_software:8.5.1.1</product> <product>adaptive_security_appliance_software:8.5.1.6</product> <product>adaptive_security_appliance_software:8.5.1.7</product> <product>adaptive_security_appliance_software:8.5.1.14</product> <product>adaptive_security_appliance_software:8.5.1.17</product> <product>adaptive_security_appliance_software:8.5.1.18</product> <product>adaptive_security_appliance_software:8.5.1.19</product> <product>adaptive_security_appliance_software:8.5.1.21</product> <product>adaptive_security_appliance_software:8.5.1.24</product> <product>adaptive_security_appliance_software:8.6.1</product> <product>adaptive_security_appliance_software:8.6.1.1</product> <product>adaptive_security_appliance_software:8.6.1.2</product> <product>adaptive_security_appliance_software:8.6.1.5</product> <product>adaptive_security_appliance_software:8.6.1.10</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:8.6.1.13</product> <product>adaptive_security_appliance_software:8.6.1.14</product> <product>adaptive_security_appliance_software:8.6.1.17</product> <product>adaptive_security_appliance_software:8.7.1</product> <product>adaptive_security_appliance_software:8.7.1.1</product> <product>adaptive_security_appliance_software:8.7.1.3</product> <product>adaptive_security_appliance_software:8.7.1.4</product> <product>adaptive_security_appliance_software:8.7.1.7</product> <product>adaptive_security_appliance_software:8.7.1.8</product> <product>adaptive_security_appliance_software:8.7.1.11</product> <product>adaptive_security_appliance_software:8.7.1.13</product> <product>adaptive_security_appliance_software:8.7.1.16</product> <product>adaptive_security_appliance_software:8.7.1.17</product> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.5.1</product> <product>adaptive_security_appliance_software:9.5.2</product> </cve> <cve id="CVE-2016-1286" level="LOW"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>suse_manager:2.1</product> <product>suse_manager_proxy:2.1</product> <product>suse_openstack_cloud:5</product> </cve> <cve id="CVE-2016-1285" level="MEDIUM"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>suse_manager:2.1</product> <product>suse_manager_proxy:2.1</product> <product>suse_openstack_cloud:5</product> </cve> <cve id="CVE-2016-1284" level="HIGH"> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> </cve> <cve id="CVE-2016-1283" level="LOW"> <product>perl_compatible_regular_expression_library:8.38</product> </cve> <cve id="CVE-2016-1281" level="MEDIUM"> <product>truecrypt:7.1</product> <product>truecrypt:7.2</product> <product>veracrypt:1.16</product> </cve> <cve id="CVE-2016-1280" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x50</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:16.1</product> </cve> <cve id="CVE-2016-9920" level="MEDIUM"> <product>webmail:1.1.6</product> <product>webmail:1.2.0</product> <product>webmail:1.2.1</product> <product>webmail:1.2.2</product> </cve> <cve id="CVE-2016-9921" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8106" level="MEDIUM"> <product>ethernet_10gb_2-port_562flr-sfp%2b</product> <product>ethernet_10gb_2-port_562sfp%2b</product> <product>ethernet_10gb_4-port_563sfp%2b</product> <product>proliant_xl260a_g9_server</product> <product>converged_hx5500_appliance:5.05</product> <product>converged_hx5510_appliance:5.05</product> <product>converged_hx7500_appliance:5.05</product> <product>converged_hx7510_appliance:5.05</product> <product>converged_hx_series:5.05</product> <product>nextscale_nx360_m5:5.05</product> <product>system_x3250_m5:5.05</product> <product>system_x3500_m5:5.05</product> <product>system_x3550_m5:5.05</product> <product>system_x3650_m5:5.05</product> <product>system_x3750_m4:5.05</product> <product>system_x3850_x6:5.05</product> <product>system_x3950_x6:5.05</product> <product>thinkagile_cx2200:5.05</product> <product>thinkagile_cx4200:5.05</product> <product>thinkagile_cx4600:5.05</product> <product>thinkserver_rd350:5.05</product> <product>thinkserver_rd450:5.05</product> <product>thinkserver_rd550:5.05</product> <product>thinkserver_rd650:5.05</product> <product>thinkserver_sd350:5.05</product> <product>thinkserver_td350:5.05</product> <product>ethernet_controller_x710_firmware:5.04</product> <product>ethernet_controller_xl710_firmware:5.04</product> </cve> <cve id="CVE-2016-8105" level="LOW"> <product>x710_series_driver:21.3</product> <product>xl710_series_driver:21.3</product> </cve> <cve id="CVE-2016-8104" level="LOW"> <product>proset%2fwireless_software_and_drivers:19.20.0</product> </cve> <cve id="CVE-2016-8103" level="LOW"> <product>canyon_bios:fybyt10h.86a</product> <product>canyon_bios:kyskli70.86a</product> <product>canyon_bios:mybdwi5v.86a</product> <product>canyon_bios:mybdwi30.86a</product> <product>canyon_bios:pybwcel.86a</product> <product>canyon_bios:rybdwi35.86a</product> <product>citry_bios:scchtax5.86a</product> <product>city_bios:ccsklm5v.86a</product> <product>city_bios:ccsklm30.86a</product> <product>city_bios:scchtax5.86a</product> <product>swift_canyon_bios:syskli35.86a</product> </cve> <cve id="CVE-2016-8102" level="LOW"> <product>wireless_bluetooth_drivers:16.0</product> <product>wireless_bluetooth_drivers:17.0</product> <product>wireless_bluetooth_drivers:18.0</product> <product>wireless_bluetooth_drivers:18.1</product> </cve> <cve id="CVE-2016-8101" level="LOW"> <product>solid-state_drive_toolbox:3.3.6</product> </cve> <cve id="CVE-2016-8100" level="LOW"> <product>integrated_performance_primitives:9.0.3</product> </cve> <cve id="CVE-2016-9278" level="LOW"> <product>exynos_fimg2d_driver:-</product> </cve> <cve id="CVE-2016-9279" level="LOW"> <product>exynos_fimg2d_driver:-</product> </cve> <cve id="CVE-2016-9276" level="LOW"> <product>libdwarf:2016-10-21</product> </cve> <cve id="CVE-2016-9277" level="LOW"> <product>samsung_mobile:4.4</product> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> </cve> <cve id="CVE-2016-9274" level="MEDIUM"> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.0</product> <product>git_for_windows:1.0.1</product> <product>git_for_windows:1.0.2</product> <product>git_for_windows:1.0.3</product> <product>git_for_windows:1.0.4</product> <product>git_for_windows:1.0.5</product> <product>git_for_windows:1.0.6</product> <product>git_for_windows:1.0.7</product> <product>git_for_windows:1.0.8</product> <product>git_for_windows:1.0.9</product> <product>git_for_windows:1.0.10</product> <product>git_for_windows:1.0.11</product> <product>git_for_windows:1.0.12</product> <product>git_for_windows:1.0.13</product> <product>git_for_windows:1.1.0</product> <product>git_for_windows:1.1.1</product> <product>git_for_windows:1.1.2</product> <product>git_for_windows:1.1.3</product> <product>git_for_windows:1.1.4</product> <product>git_for_windows:1.1.5</product> <product>git_for_windows:1.1.6</product> <product>git_for_windows:1.2.0</product> <product>git_for_windows:1.2.1</product> <product>git_for_windows:1.2.2</product> <product>git_for_windows:1.2.3</product> <product>git_for_windows:1.2.4</product> <product>git_for_windows:1.2.5</product> <product>git_for_windows:1.2.6</product> <product>git_for_windows:1.3.0</product> <product>git_for_windows:1.3.0</product> <product>git_for_windows:1.3.0</product> <product>git_for_windows:1.3.0</product> <product>git_for_windows:1.3.0</product> <product>git_for_windows:1.3.1</product> <product>git_for_windows:1.3.2</product> <product>git_for_windows:1.3.3</product> <product>git_for_windows:1.4.0</product> <product>git_for_windows:1.4.0</product> <product>git_for_windows:1.4.0</product> <product>git_for_windows:1.4.1</product> <product>git_for_windows:1.4.1</product> <product>git_for_windows:1.4.1</product> <product>git_for_windows:1.4.1.1</product> <product>git_for_windows:1.4.2</product> <product>git_for_windows:1.4.2</product> <product>git_for_windows:1.4.2</product> <product>git_for_windows:1.4.2</product> <product>git_for_windows:1.4.2</product> <product>git_for_windows:1.4.2.1</product> <product>git_for_windows:1.4.2.2</product> <product>git_for_windows:1.4.2.3</product> <product>git_for_windows:1.4.2.4</product> <product>git_for_windows:1.4.3</product> <product>git_for_windows:1.4.3</product> <product>git_for_windows:1.4.3</product> <product>git_for_windows:1.4.3</product> <product>git_for_windows:1.4.3.1</product> <product>git_for_windows:1.4.3.2</product> <product>git_for_windows:1.4.3.3</product> <product>git_for_windows:1.4.3.4</product> <product>git_for_windows:1.4.3.5</product> <product>git_for_windows:1.4.4</product> <product>git_for_windows:1.4.4</product> <product>git_for_windows:1.4.4</product> <product>git_for_windows:1.4.4.1</product> <product>git_for_windows:1.4.4.2</product> <product>git_for_windows:1.4.4.3</product> <product>git_for_windows:1.4.4.4</product> <product>git_for_windows:1.4.4.5</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0</product> <product>git_for_windows:1.5.0.1</product> <product>git_for_windows:1.5.0.2</product> <product>git_for_windows:1.5.0.3</product> <product>git_for_windows:1.5.0.4</product> <product>git_for_windows:1.5.0.5</product> <product>git_for_windows:1.5.0.6</product> <product>git_for_windows:1.5.0.7</product> <product>git_for_windows:1.5.1</product> <product>git_for_windows:1.5.1</product> <product>git_for_windows:1.5.1</product> <product>git_for_windows:1.5.1</product> <product>git_for_windows:1.5.1.1</product> <product>git_for_windows:1.5.1.2</product> <product>git_for_windows:1.5.1.3</product> <product>git_for_windows:1.5.1.4</product> <product>git_for_windows:1.5.1.5</product> <product>git_for_windows:1.5.1.6</product> <product>git_for_windows:1.5.2</product> <product>git_for_windows:1.5.2</product> <product>git_for_windows:1.5.2</product> <product>git_for_windows:1.5.2</product> <product>git_for_windows:1.5.2</product> <product>git_for_windows:1.5.2.1</product> <product>git_for_windows:1.5.2.2</product> <product>git_for_windows:1.5.2.3</product> <product>git_for_windows:1.5.2.4</product> <product>git_for_windows:1.5.2.5</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3</product> <product>git_for_windows:1.5.3.1</product> <product>git_for_windows:1.5.3.2</product> <product>git_for_windows:1.5.3.3</product> <product>git_for_windows:1.5.3.4</product> <product>git_for_windows:1.5.3.5</product> <product>git_for_windows:1.5.3.6</product> <product>git_for_windows:1.5.3.7</product> <product>git_for_windows:1.5.3.8</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4</product> <product>git_for_windows:1.5.4.1</product> <product>git_for_windows:1.5.4.2</product> <product>git_for_windows:1.5.4.3</product> <product>git_for_windows:1.5.4.4</product> <product>git_for_windows:1.5.4.5</product> <product>git_for_windows:1.5.4.6</product> <product>git_for_windows:1.5.4.7</product> <product>git_for_windows:1.5.5</product> <product>git_for_windows:1.5.5</product> <product>git_for_windows:1.5.5</product> <product>git_for_windows:1.5.5</product> <product>git_for_windows:1.5.5</product> <product>git_for_windows:1.5.5.1</product> <product>git_for_windows:1.5.5.2</product> <product>git_for_windows:1.5.5.3</product> <product>git_for_windows:1.5.5.4</product> <product>git_for_windows:1.5.5.5</product> <product>git_for_windows:1.5.5.6</product> <product>git_for_windows:1.5.6</product> <product>git_for_windows:1.5.6</product> <product>git_for_windows:1.5.6</product> <product>git_for_windows:1.5.6</product> <product>git_for_windows:1.5.6</product> <product>git_for_windows:1.5.6.1</product> <product>git_for_windows:1.5.6.2</product> <product>git_for_windows:1.5.6.3</product> <product>git_for_windows:1.5.6.4</product> <product>git_for_windows:1.5.6.5</product> <product>git_for_windows:1.5.6.6</product> <product>git_for_windows:1.6.0</product> <product>git_for_windows:1.6.0</product> <product>git_for_windows:1.6.0</product> <product>git_for_windows:1.6.0</product> <product>git_for_windows:1.6.0</product> <product>git_for_windows:1.6.0.1</product> <product>git_for_windows:1.6.0.2</product> <product>git_for_windows:1.6.0.3</product> <product>git_for_windows:1.6.0.4</product> <product>git_for_windows:1.6.0.5</product> <product>git_for_windows:1.6.0.6</product> <product>git_for_windows:1.6.1</product> <product>git_for_windows:1.6.1</product> <product>git_for_windows:1.6.1</product> <product>git_for_windows:1.6.1</product> <product>git_for_windows:1.6.1</product> <product>git_for_windows:1.6.1.1</product> <product>git_for_windows:1.6.1.2</product> <product>git_for_windows:1.6.1.3</product> <product>git_for_windows:1.6.1.4</product> <product>git_for_windows:1.6.2</product> <product>git_for_windows:1.6.2</product> <product>git_for_windows:1.6.2</product> <product>git_for_windows:1.6.2</product> <product>git_for_windows:1.6.2.1</product> <product>git_for_windows:1.6.2.2</product> <product>git_for_windows:1.6.2.3</product> <product>git_for_windows:1.6.2.4</product> <product>git_for_windows:1.6.2.5</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3</product> <product>git_for_windows:1.6.3.1</product> <product>git_for_windows:1.6.3.2</product> <product>git_for_windows:1.6.3.3</product> <product>git_for_windows:1.6.3.4</product> <product>git_for_windows:1.6.4</product> <product>git_for_windows:1.6.4</product> <product>git_for_windows:1.6.4</product> <product>git_for_windows:1.6.4</product> <product>git_for_windows:1.6.4</product> <product>git_for_windows:1.6.4.1</product> <product>git_for_windows:1.6.4.2</product> <product>git_for_windows:1.6.4.3</product> <product>git_for_windows:1.6.4.4</product> <product>git_for_windows:1.6.4.5</product> <product>git_for_windows:1.6.5</product> <product>git_for_windows:1.6.5</product> <product>git_for_windows:1.6.5</product> <product>git_for_windows:1.6.5</product> <product>git_for_windows:1.6.5</product> <product>git_for_windows:1.6.5.1</product> <product>git_for_windows:1.6.5.2</product> <product>git_for_windows:1.6.5.3</product> <product>git_for_windows:1.6.5.4</product> <product>git_for_windows:1.6.5.5</product> <product>git_for_windows:1.6.5.6</product> <product>git_for_windows:1.6.5.7</product> <product>git_for_windows:1.6.5.8</product> <product>git_for_windows:1.6.5.9</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6</product> <product>git_for_windows:1.6.6.1</product> <product>git_for_windows:1.6.6.2</product> <product>git_for_windows:1.6.6.3</product> <product>git_for_windows:1.7.0</product> <product>git_for_windows:1.7.0</product> <product>git_for_windows:1.7.0</product> <product>git_for_windows:1.7.0</product> <product>git_for_windows:1.7.0.1</product> <product>git_for_windows:1.7.0.2</product> <product>git_for_windows:1.7.0.3</product> <product>git_for_windows:1.7.0.4</product> <product>git_for_windows:1.7.0.5</product> <product>git_for_windows:1.7.0.6</product> <product>git_for_windows:1.7.0.7</product> <product>git_for_windows:1.7.0.8</product> <product>git_for_windows:1.7.0.9</product> <product>git_for_windows:1.7.1</product> <product>git_for_windows:1.7.1</product> <product>git_for_windows:1.7.1</product> <product>git_for_windows:1.7.1</product> <product>git_for_windows:1.7.1.1</product> <product>git_for_windows:1.7.1.2</product> <product>git_for_windows:1.7.1.3</product> <product>git_for_windows:1.7.1.4</product> <product>git_for_windows:1.7.2</product> <product>git_for_windows:1.7.2</product> <product>git_for_windows:1.7.2</product> <product>git_for_windows:1.7.2</product> <product>git_for_windows:1.7.2</product> <product>git_for_windows:1.7.2.1</product> <product>git_for_windows:1.7.2.2</product> <product>git_for_windows:1.7.2.3</product> <product>git_for_windows:1.7.2.4</product> <product>git_for_windows:1.7.2.5</product> <product>git_for_windows:1.7.3</product> <product>git_for_windows:1.7.3</product> <product>git_for_windows:1.7.3</product> <product>git_for_windows:1.7.3</product> <product>git_for_windows:1.7.3.1</product> <product>git_for_windows:1.7.3.2</product> <product>git_for_windows:1.7.3.3</product> <product>git_for_windows:1.7.3.4</product> <product>git_for_windows:1.7.3.5</product> <product>git_for_windows:1.7.4</product> <product>git_for_windows:1.7.4</product> <product>git_for_windows:1.7.4</product> <product>git_for_windows:1.7.4</product> <product>git_for_windows:1.7.4</product> <product>git_for_windows:1.7.4.1</product> <product>git_for_windows:1.7.4.2</product> <product>git_for_windows:1.7.4.3</product> <product>git_for_windows:1.7.4.4</product> <product>git_for_windows:1.7.4.5</product> <product>git_for_windows:1.7.5</product> <product>git_for_windows:1.7.5</product> <product>git_for_windows:1.7.5</product> <product>git_for_windows:1.7.5</product> <product>git_for_windows:1.7.5</product> <product>git_for_windows:1.7.5.1</product> <product>git_for_windows:1.7.5.2</product> <product>git_for_windows:1.7.5.3</product> <product>git_for_windows:1.7.5.4</product> <product>git_for_windows:1.7.6</product> <product>git_for_windows:1.7.6</product> <product>git_for_windows:1.7.6</product> <product>git_for_windows:1.7.6</product> <product>git_for_windows:1.7.6</product> <product>git_for_windows:1.7.6.1</product> <product>git_for_windows:1.7.6.2</product> <product>git_for_windows:1.7.6.3</product> <product>git_for_windows:1.7.6.4</product> <product>git_for_windows:1.7.7</product> <product>git_for_windows:1.7.7</product> <product>git_for_windows:1.7.7</product> <product>git_for_windows:1.7.7</product> <product>git_for_windows:1.7.7</product> <product>git_for_windows:1.7.7.1</product> <product>git_for_windows:1.7.7.2</product> <product>git_for_windows:1.7.7.3</product> <product>git_for_windows:1.7.7.4</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8</product> <product>git_for_windows:1.7.8.1</product> <product>git_for_windows:1.7.8.2</product> <product>git_for_windows:1.7.8.3</product> <product>git_for_windows:1.7.8.4</product> <product>git_for_windows:1.7.8.5</product> <product>git_for_windows:1.7.9</product> <product>git_for_windows:1.7.9</product> <product>git_for_windows:1.7.9</product> <product>git_for_windows:1.7.9</product> <product>git_for_windows:1.7.9.1</product> <product>git_for_windows:1.7.9.2</product> <product>git_for_windows:1.7.9.3</product> <product>git_for_windows:1.7.9.4</product> <product>git_for_windows:1.7.9.5</product> <product>git_for_windows:1.7.9.6</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10</product> <product>git_for_windows:1.7.10.1</product> <product>git_for_windows:1.7.10.2</product> <product>git_for_windows:1.7.10.3</product> <product>git_for_windows:1.7.10.4</product> <product>git_for_windows:1.7.10.5</product> <product>git_for_windows:1.7.11</product> <product>git_for_windows:1.7.11</product> <product>git_for_windows:1.7.11</product> <product>git_for_windows:1.7.11</product> <product>git_for_windows:1.7.11</product> <product>git_for_windows:1.7.11.1</product> <product>git_for_windows:1.7.11.2</product> <product>git_for_windows:1.7.11.3</product> <product>git_for_windows:1.7.11.4</product> <product>git_for_windows:1.7.11.5</product> <product>git_for_windows:1.7.11.6</product> <product>git_for_windows:1.7.11.7</product> <product>git_for_windows:1.7.12</product> <product>git_for_windows:1.7.12</product> <product>git_for_windows:1.7.12</product> <product>git_for_windows:1.7.12</product> <product>git_for_windows:1.7.12</product> <product>git_for_windows:1.7.12.1</product> <product>git_for_windows:1.7.12.2</product> <product>git_for_windows:1.7.12.3</product> <product>git_for_windows:1.7.12.4</product> <product>git_for_windows:1.8.0</product> <product>git_for_windows:1.8.0</product> <product>git_for_windows:1.8.0</product> <product>git_for_windows:1.8.0</product> <product>git_for_windows:1.8.0</product> <product>git_for_windows:1.8.0.1</product> <product>git_for_windows:1.8.0.2</product> <product>git_for_windows:1.8.1</product> <product>git_for_windows:1.8.1</product> <product>git_for_windows:1.8.1</product> <product>git_for_windows:1.8.1</product> <product>git_for_windows:1.8.1</product> <product>git_for_windows:1.8.1.1</product> <product>git_for_windows:1.8.1.2</product> <product>git_for_windows:1.8.1.3</product> <product>git_for_windows:1.8.1.4</product> <product>git_for_windows:1.8.1.5</product> <product>git_for_windows:1.8.1.6</product> <product>git_for_windows:1.8.2</product> <product>git_for_windows:1.8.2</product> <product>git_for_windows:1.8.2</product> <product>git_for_windows:1.8.2</product> <product>git_for_windows:1.8.2</product> <product>git_for_windows:1.8.2.1</product> <product>git_for_windows:1.8.2.2</product> <product>git_for_windows:1.8.2.3</product> <product>git_for_windows:1.8.3</product> <product>git_for_windows:1.8.3</product> <product>git_for_windows:1.8.3</product> <product>git_for_windows:1.8.3</product> <product>git_for_windows:1.8.3</product> <product>git_for_windows:1.8.3.1</product> <product>git_for_windows:1.8.3.2</product> <product>git_for_windows:1.8.3.3</product> <product>git_for_windows:1.8.3.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4</product> <product>git_for_windows:1.8.4.1</product> <product>git_for_windows:1.8.4.2</product> <product>git_for_windows:1.8.4.3</product> <product>git_for_windows:1.8.4.4</product> <product>git_for_windows:1.8.5</product> <product>git_for_windows:1.8.5</product> <product>git_for_windows:1.8.5</product> <product>git_for_windows:1.8.5</product> <product>git_for_windows:1.8.5</product> <product>git_for_windows:1.8.5.1</product> <product>git_for_windows:1.8.5.2</product> <product>git_for_windows:1.8.5.3</product> <product>git_for_windows:1.8.5.4</product> <product>git_for_windows:1.8.5.5</product> <product>git_for_windows:1.9.0</product> <product>git_for_windows:1.9.0</product> <product>git_for_windows:1.9.0</product> <product>git_for_windows:1.9.0</product> <product>git_for_windows:1.9.0</product> <product>git_for_windows:1.9.1</product> <product>git_for_windows:1.9.2</product> <product>git_for_windows:1.9.3</product> <product>git_for_windows:1.9.4</product> </cve> <cve id="CVE-2016-9275" level="LOW"> <product>libdwarf:2016-10-21</product> </cve> <cve id="CVE-2016-9272" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9273" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-1469" level="LOW"> <product>spa300_series_ip_phone_firmware:7.5.7%286%29</product> <product>spa500_series_ip_phone_firmware:7.5.7%286%29</product> </cve> <cve id="CVE-2016-1468" level="LOW"> <product>telepresence_video_communication_server:x8.5.2</product> </cve> <cve id="CVE-2016-4103" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1462" level="MEDIUM"> <product>prime_service_catalog:11.0_base</product> </cve> <cve id="CVE-2016-1461" level="LOW"> <product>email_security_appliance:7.1.0</product> <product>email_security_appliance:7.1.1</product> <product>email_security_appliance:7.1.2</product> <product>email_security_appliance:7.1.3</product> <product>email_security_appliance:7.1.4</product> <product>email_security_appliance:7.1.5</product> <product>email_security_appliance:7.3.0</product> <product>email_security_appliance:7.3.1</product> <product>email_security_appliance:7.3.2</product> <product>email_security_appliance:7.5.0</product> <product>email_security_appliance:7.5.1</product> <product>email_security_appliance:7.5.2</product> <product>email_security_appliance:7.5.2-201</product> <product>email_security_appliance:7.6.0</product> <product>email_security_appliance:7.6.1-000</product> <product>email_security_appliance:7.6.1-gpl-022</product> <product>email_security_appliance:7.6.2</product> <product>email_security_appliance:7.6.3-000</product> <product>email_security_appliance:7.6.3-025</product> <product>email_security_appliance:7.7.0-000</product> <product>email_security_appliance:7.7.1-000</product> <product>email_security_appliance:7.8.0</product> <product>email_security_appliance:7.8.0-311</product> <product>email_security_appliance:8.0.1-023</product> <product>email_security_appliance:8.0_base</product> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.1.1-000</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> </cve> <cve id="CVE-2016-1460" level="LOW"> <product>wireless_lan_controller_software:7.4.121.0</product> <product>wireless_lan_controller_software:8.0.0.30220.385</product> </cve> <cve id="CVE-2016-1467" level="LOW"> <product>videoscape_session_resource_manager:-</product> </cve> <cve id="CVE-2016-1466" level="LOW"> <product>unified_communications_manager_im_and_presence_service:9.1%281%29</product> <product>unified_communications_manager_im_and_presence_service:10.5%282%29</product> <product>unified_communications_manager_im_and_presence_service:11.0%281%29</product> <product>unified_communications_manager_im_and_presence_service:11.5%281%29</product> </cve> <cve id="CVE-2016-1465" level="LOW"> <product>nx-os:4.0%284%29sv1%281%29</product> <product>nx-os:4.0%284%29sv1%282%29</product> <product>nx-os:4.0%284%29sv1%283%29</product> <product>nx-os:4.0%284%29sv1%283a%29</product> <product>nx-os:4.0%284%29sv1%283b%29</product> <product>nx-os:4.0%284%29sv1%283c%29</product> <product>nx-os:4.0%284%29sv1%283d%29</product> <product>nx-os:4.2%281%29sv1%284%29</product> <product>nx-os:4.2%281%29sv1%284a%29</product> <product>nx-os:4.2%281%29sv1%284b%29</product> <product>nx-os:4.2%281%29sv1%285.1%29</product> <product>nx-os:4.2%281%29sv1%285.1a%29</product> <product>nx-os:4.2%281%29sv1%285.2%29</product> <product>nx-os:4.2%281%29sv1%285.2b%29</product> <product>nx-os:4.2%281%29sv2%281.1%29</product> <product>nx-os:4.2%281%29sv2%281.1a%29</product> <product>nx-os:4.2%281%29sv2%282.1%29</product> <product>nx-os:4.2%281%29sv2%282.1a%29</product> <product>nx-os:5.2%281%29sv3%281.1%29</product> <product>nx-os:5.2%281%29sv3%281.3%29</product> <product>nx-os:5.2%281%29sv3%281.4%29</product> </cve> <cve id="CVE-2016-1464" level="MEDIUM"> <product>webex_wrf_player_t29:sp10_base</product> </cve> <cve id="CVE-2016-0792" level="LOW"> <product>jenkins:1.642.1</product> <product>jenkins:1.649</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-0793" level="LOW"> <product>jboss_wildfly_application_server:10.0.0</product> </cve> <cve id="CVE-2016-1233" level="LOW"> <product>fuse:2.9.3-14</product> </cve> <cve id="CVE-2016-1000129" level="MEDIUM"> <product>defa-online-image-protector:3.3</product> </cve> <cve id="CVE-2016-1000128" level="MEDIUM"> <product>anti-plagiarism:3.60</product> </cve> <cve id="CVE-2016-1000123" level="LOW"> <product>video_gallery:1.0.9</product> </cve> <cve id="CVE-2016-1000122" level="LOW"> <product>slider:1.0.9</product> </cve> <cve id="CVE-2016-1000121" level="MEDIUM"> <product>slider:1.0.9</product> </cve> <cve id="CVE-2016-1000120" level="LOW"> <product>catalog:1.0.4</product> </cve> <cve id="CVE-2016-1000127" level="MEDIUM"> <product>ajax-random-post:2.00</product> </cve> <cve id="CVE-2016-1000126" level="MEDIUM"> <product>admin-font-editor:1.8</product> </cve> <cve id="CVE-2016-1000125" level="LOW"> <product>huge-it_catalog:1.0.7</product> </cve> <cve id="CVE-2016-1000124" level="LOW"> <product>portfolio_gallery:1.0.6</product> </cve> <cve id="CVE-2016-5920" level="MEDIUM"> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.1.0</product> <product>financial_transaction_manager:3.0.1.0</product> </cve> <cve id="CVE-2016-8344" level="MEDIUM"> <product>experion_process_knowledge_system:311</product> <product>experion_process_knowledge_system:400</product> <product>experion_process_knowledge_system:410</product> <product>experion_process_knowledge_system:430</product> <product>experion_process_knowledge_system:431</product> </cve> <cve id="CVE-2016-5504" level="MEDIUM"> <product>agile_product_supplier_collaboration_for_process:6.1.0.4</product> <product>agile_product_supplier_collaboration_for_process:6.1.1.6</product> <product>agile_product_supplier_collaboration_for_process:6.2.0.0</product> </cve> <cve id="CVE-2016-5506" level="MEDIUM"> <product>identity_manager:-</product> </cve> <cve id="CVE-2016-5500" level="LOW"> <product>discoverer:11.1.1.7.0</product> </cve> <cve id="CVE-2016-5501" level="LOW"> <product>vm_virtualbox:5.0.27</product> <product>vm_virtualbox:5.1.7</product> </cve> <cve id="CVE-2016-5502" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> </cve> <cve id="CVE-2016-5503" level="LOW"> <product>sun_zfs_storage_appliance_kit:ak_2013</product> </cve> <cve id="CVE-2016-1000344" level="MEDIUM"> <product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product> </cve> <cve id="CVE-2016-5509" level="MEDIUM"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-1000340" level="LOW"> <product>legion-of-the-bouncy-castle-java-crytography-api:1.54</product> </cve> <cve id="CVE-2016-0909" level="LOW"> <product>avamar_data_store:7.3</product> <product>avamar_server_virtual_edition:7.3</product> </cve> <cve id="CVE-2016-0908" level="LOW"> <product>isilon_onefs:7.1.0.0</product> <product>isilon_onefs:7.1.0.1</product> <product>isilon_onefs:7.1.0.2</product> <product>isilon_onefs:7.1.0.3</product> <product>isilon_onefs:7.1.0.4</product> <product>isilon_onefs:7.1.0.5</product> <product>isilon_onefs:7.1.0.6</product> <product>isilon_onefs:7.1.1.0</product> <product>isilon_onefs:7.1.1.1</product> <product>isilon_onefs:7.1.1.2</product> <product>isilon_onefs:7.1.1.3</product> <product>isilon_onefs:7.1.1.4</product> <product>isilon_onefs:7.1.1.5</product> <product>isilon_onefs:7.1.1.6</product> <product>isilon_onefs:7.1.1.7</product> <product>isilon_onefs:7.1.1.8</product> <product>isilon_onefs:7.2.0.0</product> <product>isilon_onefs:7.2.0.1</product> <product>isilon_onefs:7.2.0.2</product> <product>isilon_onefs:7.2.0.3</product> <product>isilon_onefs:7.2.0.4</product> <product>isilon_onefs:7.2.0.5</product> <product>isilon_onefs:7.2.1.0</product> <product>isilon_onefs:7.2.1.1</product> </cve> <cve id="CVE-2016-0907" level="MEDIUM"> <product>isilon_onefs:7.1.0.0</product> <product>isilon_onefs:7.1.0.1</product> <product>isilon_onefs:7.1.0.2</product> <product>isilon_onefs:7.1.0.3</product> <product>isilon_onefs:7.1.0.4</product> <product>isilon_onefs:7.1.0.5</product> <product>isilon_onefs:7.1.0.6</product> <product>isilon_onefs:7.1.1.0</product> <product>isilon_onefs:7.1.1.1</product> <product>isilon_onefs:7.1.1.2</product> <product>isilon_onefs:7.1.1.3</product> <product>isilon_onefs:7.1.1.4</product> <product>isilon_onefs:7.1.1.5</product> <product>isilon_onefs:7.1.1.6</product> <product>isilon_onefs:7.1.1.7</product> <product>isilon_onefs:7.1.1.8</product> <product>isilon_onefs:7.1.1.9</product> <product>isilon_onefs:7.2.0.0</product> <product>isilon_onefs:7.2.1.0</product> <product>isilon_onefs:7.2.1.1</product> <product>isilon_onefs:7.2.1.2</product> <product>isilon_onefs:8.0.0.0</product> <product>isilonsd_edge_onefs:8.0.0.0</product> </cve> <cve id="CVE-2016-0906" level="LOW"> <product>avamar:7.2.1</product> </cve> <cve id="CVE-2016-0905" level="LOW"> <product>avamar_server:7.3.0</product> </cve> <cve id="CVE-2016-0904" level="LOW"> <product>avamar_server:7.3.0</product> </cve> <cve id="CVE-2016-0903" level="LOW"> <product>avamar_server:7.3.0</product> </cve> <cve id="CVE-2016-0902" level="LOW"> <product>rsa_authentication_manager:8.1</product> </cve> <cve id="CVE-2016-0901" level="MEDIUM"> <product>rsa_authentication_manager:8.1</product> </cve> <cve id="CVE-2016-0900" level="MEDIUM"> <product>rsa_authentication_manager:8.1</product> </cve> <cve id="CVE-2016-6080" level="LOW"> <product>websphere_message_broker:8.0</product> </cve> <cve id="CVE-2016-6082" level="LOW"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-6083" level="LOW"> <product>tivoli_monitoring:6.2.2</product> <product>tivoli_monitoring:6.2.2.0</product> <product>tivoli_monitoring:6.2.2.1</product> <product>tivoli_monitoring:6.2.2.2</product> <product>tivoli_monitoring:6.2.2.3</product> <product>tivoli_monitoring:6.2.2.4</product> <product>tivoli_monitoring:6.2.2.5</product> <product>tivoli_monitoring:6.2.2.6</product> <product>tivoli_monitoring:6.2.2.7</product> <product>tivoli_monitoring:6.2.2.8</product> <product>tivoli_monitoring:6.2.2.9</product> <product>tivoli_monitoring:6.2.3</product> <product>tivoli_monitoring:6.2.3.0</product> <product>tivoli_monitoring:6.2.3.1</product> <product>tivoli_monitoring:6.2.3.2</product> <product>tivoli_monitoring:6.2.3.3</product> <product>tivoli_monitoring:6.2.3.4</product> <product>tivoli_monitoring:6.2.3.5</product> <product>tivoli_monitoring:6.3.0</product> <product>tivoli_monitoring:6.3.0.1</product> <product>tivoli_monitoring:6.3.0.2</product> <product>tivoli_monitoring:6.3.0.3</product> <product>tivoli_monitoring:6.3.0.4</product> <product>tivoli_monitoring:6.3.0.5</product> <product>tivoli_monitoring:6.3.0.6</product> <product>tivoli_monitoring:6.3.0.7</product> </cve> <cve id="CVE-2016-6084" level="LOW"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> </cve> <cve id="CVE-2016-6085" level="LOW"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-6087" level="LOW"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>domino:9.0.1.7</product> </cve> <cve id="CVE-2016-6089" level="LOW"> <product>websphere_mq:9.0.0.0</product> <product>websphere_mq:9.0.1</product> </cve> <cve id="CVE-2016-6888" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6882" level="MEDIUM"> <product>matrixssl:3.8.6</product> </cve> <cve id="CVE-2016-6883" level="MEDIUM"> <product>matrixssl:3.8.2</product> </cve> <cve id="CVE-2016-6884" level="MEDIUM"> <product>matrixssl:3.8.2</product> </cve> <cve id="CVE-2016-6885" level="LOW"> <product>matrixssl:3.8.3</product> </cve> <cve id="CVE-2016-6886" level="LOW"> <product>matrixssl:3.8.3</product> </cve> <cve id="CVE-2016-6887" level="MEDIUM"> <product>matrixssl:3.8.6</product> </cve> <cve id="CVE-2016-3612" level="MEDIUM"> <product>vm_virtualbox:5.0.20</product> </cve> <cve id="CVE-2016-3613" level="LOW"> <product>secure_global_desktop:4.63</product> <product>secure_global_desktop:4.71</product> <product>secure_global_desktop:5.2</product> </cve> <cve id="CVE-2016-3611" level="MEDIUM"> <product>retail_order_broker_cloud_service:15.0</product> </cve> <cve id="CVE-2016-3619" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-8730" level="MEDIUM"> <product>coreldraw_photo_paint_x8:18.1.0.661</product> </cve> <cve id="CVE-2016-8731" level="LOW"> <product>c1_webcam_firmware:1.9.1.12</product> </cve> <cve id="CVE-2016-8732" level="LOW"> <product>invincea_dell_protected_workspace:5.1.1-22303</product> </cve> <cve id="CVE-2016-8733" level="LOW"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-8734" level="LOW"> <product>subversion:1.4.0</product> <product>subversion:1.4.1</product> <product>subversion:1.4.2</product> <product>subversion:1.4.3</product> <product>subversion:1.4.4</product> <product>subversion:1.4.5</product> <product>subversion:1.4.6</product> <product>subversion:1.5.0</product> <product>subversion:1.5.1</product> <product>subversion:1.5.2</product> <product>subversion:1.5.3</product> <product>subversion:1.5.4</product> <product>subversion:1.5.5</product> <product>subversion:1.5.6</product> <product>subversion:1.5.7</product> <product>subversion:1.5.8</product> <product>subversion:1.6.0</product> <product>subversion:1.6.1</product> <product>subversion:1.6.2</product> <product>subversion:1.6.3</product> <product>subversion:1.6.4</product> <product>subversion:1.6.5</product> <product>subversion:1.6.6</product> <product>subversion:1.6.7</product> <product>subversion:1.6.8</product> <product>subversion:1.6.9</product> <product>subversion:1.6.10</product> <product>subversion:1.6.11</product> <product>subversion:1.6.12</product> <product>subversion:1.6.13</product> <product>subversion:1.6.14</product> <product>subversion:1.6.15</product> <product>subversion:1.6.16</product> <product>subversion:1.6.17</product> <product>subversion:1.6.18</product> <product>subversion:1.6.19</product> <product>subversion:1.6.20</product> <product>subversion:1.6.21</product> <product>subversion:1.6.23</product> <product>subversion:1.7.0</product> <product>subversion:1.7.1</product> <product>subversion:1.7.2</product> <product>subversion:1.7.3</product> <product>subversion:1.7.4</product> <product>subversion:1.7.5</product> <product>subversion:1.7.6</product> <product>subversion:1.7.7</product> <product>subversion:1.7.8</product> <product>subversion:1.7.9</product> <product>subversion:1.7.10</product> <product>subversion:1.7.11</product> <product>subversion:1.7.12</product> <product>subversion:1.7.13</product> <product>subversion:1.7.14</product> <product>subversion:1.7.15</product> <product>subversion:1.7.16</product> <product>subversion:1.7.17</product> <product>subversion:1.7.18</product> <product>subversion:1.7.19</product> <product>subversion:1.7.20</product> <product>subversion:1.8.0</product> <product>subversion:1.8.1</product> <product>subversion:1.8.2</product> <product>subversion:1.8.3</product> <product>subversion:1.8.4</product> <product>subversion:1.8.5</product> <product>subversion:1.8.6</product> <product>subversion:1.8.7</product> <product>subversion:1.8.8</product> <product>subversion:1.8.9</product> <product>subversion:1.8.10</product> <product>subversion:1.8.11</product> <product>subversion:1.8.12</product> <product>subversion:1.8.13</product> <product>subversion:1.8.14</product> <product>subversion:1.8.15</product> <product>subversion:1.8.16</product> <product>subversion:1.9.0</product> <product>subversion:1.9.1</product> <product>subversion:1.9.2</product> <product>subversion:1.9.3</product> <product>subversion:1.9.4</product> </cve> <cve id="CVE-2016-8736" level="LOW"> <product>openmeetings:3.1.1</product> </cve> <cve id="CVE-2016-8737" level="MEDIUM"> <product>brooklyn:0.9.0</product> </cve> <cve id="CVE-2016-8738" level="MEDIUM"> <product>struts:2.5</product> <product>struts:2.5.1</product> <product>struts:2.5.2</product> <product>struts:2.5.3</product> <product>struts:2.5.4</product> <product>struts:2.5.5</product> </cve> <cve id="CVE-2016-8739" level="LOW"> <product>cxf:3.0.11</product> <product>cxf:3.1.0</product> <product>cxf:3.1.1</product> <product>cxf:3.1.2</product> <product>cxf:3.1.3</product> <product>cxf:3.1.4</product> <product>cxf:3.1.5</product> <product>cxf:3.1.6</product> <product>cxf:3.1.7</product> <product>cxf:3.1.8</product> </cve> <cve id="CVE-2016-8598" level="LOW"> <product>libcsp:1.4</product> </cve> <cve id="CVE-2016-8596" level="LOW"> <product>libcsp:1.4</product> </cve> <cve id="CVE-2016-8597" level="LOW"> <product>libcsp:1.4</product> </cve> <cve id="CVE-2016-8590" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8591" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8592" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8593" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-7821" level="MEDIUM"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-7820" level="LOW"> <product>ts-wrla_firmware:1.01.02</product> <product>ts-wrlp_firmware:1.01.02</product> </cve> <cve id="CVE-2016-7823" level="MEDIUM"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-7822" level="MEDIUM"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-7825" level="LOW"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-7824" level="LOW"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-7826" level="LOW"> <product>wnc01wh_firmware:1.0.0.8</product> </cve> <cve id="CVE-2016-9463" level="MEDIUM"> <product>nextcloud:9.0.53</product> <product>nextcloud:10.0.0</product> <product>owncloud:8.2.8</product> <product>owncloud:9.0.5</product> <product>owncloud:9.1.1</product> </cve> <cve id="CVE-2016-9462" level="LOW"> <product>nextcloud:9.0.51</product> <product>owncloud:8.0.13</product> <product>owncloud:8.1.8</product> <product>owncloud:8.2.6</product> <product>owncloud:9.0.3</product> </cve> <cve id="CVE-2016-9461" level="LOW"> <product>nextcloud:9.0.51</product> <product>owncloud:8.0.13</product> <product>owncloud:8.1.8</product> <product>owncloud:8.2.6</product> <product>owncloud:9.0.3</product> </cve> <cve id="CVE-2016-9460" level="LOW"> <product>nextcloud:9.0.51</product> <product>owncloud:9.0.3</product> </cve> <cve id="CVE-2016-9467" level="LOW"> <product>nextcloud:9.0.53</product> <product>nextcloud:10.0.0</product> <product>owncloud:9.0.5</product> <product>owncloud:9.1.1</product> </cve> <cve id="CVE-2016-9466" level="MEDIUM"> <product>nextcloud:10.0.0</product> <product>owncloud:9.0.5</product> <product>owncloud:9.1.1</product> </cve> <cve id="CVE-2016-9465" level="MEDIUM"> <product>nextcloud:10.0.0</product> <product>owncloud:9.0.5</product> <product>owncloud:9.1.1</product> </cve> <cve id="CVE-2016-9464" level="LOW"> <product>nextcloud_server:9.0.53</product> <product>nextcloud_server:9.1.1</product> </cve> <cve id="CVE-2016-9469" level="LOW"> <product>gitlab:8.13.0</product> <product>gitlab:8.13.0</product> <product>gitlab:8.13.1</product> <product>gitlab:8.13.1</product> <product>gitlab:8.13.2</product> <product>gitlab:8.13.2</product> <product>gitlab:8.13.3</product> <product>gitlab:8.13.3</product> <product>gitlab:8.13.4</product> <product>gitlab:8.13.4</product> <product>gitlab:8.13.5</product> <product>gitlab:8.13.5</product> <product>gitlab:8.13.6</product> <product>gitlab:8.13.6</product> <product>gitlab:8.13.7</product> <product>gitlab:8.13.7</product> <product>gitlab:8.14.0</product> <product>gitlab:8.14.0</product> <product>gitlab:8.14.1</product> <product>gitlab:8.14.1</product> <product>gitlab:8.14.2</product> <product>gitlab:8.14.2</product> </cve> <cve id="CVE-2016-9468" level="LOW"> <product>nextcloud_server:9.0.53</product> <product>nextcloud_server:10.0.0</product> <product>owncloud:9.0.5</product> <product>owncloud:9.1.1</product> </cve> <cve id="CVE-2016-1610" level="LOW"> <product>filr:1.2</product> <product>filr:2.0</product> </cve> <cve id="CVE-2016-1611" level="LOW"> <product>filr:1.2</product> <product>filr:2.0</product> </cve> <cve id="CVE-2016-5759" level="MEDIUM"> <product>leap:42.1</product> <product>suse_linux_enterprise_desktop:12.0</product> <product>suse_linux_enterprise_server:12.0</product> </cve> <cve id="CVE-2016-5758" level="MEDIUM"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5979" level="LOW"> <product>distributed_marketing:8.6.0.0</product> <product>distributed_marketing:8.6.0.2</product> <product>distributed_marketing:8.6.0.3</product> <product>distributed_marketing:8.6.0.4</product> <product>distributed_marketing:8.6.0.5</product> <product>distributed_marketing:8.6.0.6</product> <product>distributed_marketing:8.6.0.7</product> <product>distributed_marketing:8.6.0.8</product> <product>distributed_marketing:8.6.0.9</product> <product>distributed_marketing:8.6.0.10</product> <product>distributed_marketing:9.1.0.0</product> <product>distributed_marketing:9.1.0.2</product> <product>distributed_marketing:9.1.0.3</product> <product>distributed_marketing:9.1.0.4</product> <product>distributed_marketing:9.1.0.5</product> <product>distributed_marketing:9.1.0.6</product> <product>distributed_marketing:9.1.0.7</product> <product>distributed_marketing:9.1.0.8</product> <product>distributed_marketing:9.1.0.9</product> <product>distributed_marketing:9.1.0.10</product> <product>distributed_marketing:9.1.0.11</product> <product>distributed_marketing:9.1.2.0</product> <product>distributed_marketing:9.1.2.1</product> <product>distributed_marketing:9.1.2.2</product> <product>distributed_marketing:9.1.2.3</product> <product>distributed_marketing:10.0.0.0</product> <product>distributed_marketing:10.0.0.1</product> </cve> <cve id="CVE-2016-5978" level="MEDIUM"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.0a</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-1566" level="MEDIUM"> <product>guacamole:0.9.8</product> <product>guacamole:0.9.9</product> </cve> <cve id="CVE-2016-5751" level="MEDIUM"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5750" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5977" level="MEDIUM"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-5752" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5755" level="MEDIUM"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5970" level="LOW"> <product>security_privileged_identity_manager_virtual_appliance:2.0.2</product> </cve> <cve id="CVE-2016-5757" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5756" level="MEDIUM"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-1567" level="MEDIUM"> <product>chrony:1.31.1</product> <product>chrony:2.0</product> <product>chrony:2.1</product> <product>chrony:2.1.1</product> <product>chrony:2.2</product> </cve> <cve id="CVE-2016-9645" level="LOW"> <product>ikiwiki:1.0</product> <product>ikiwiki:1.1</product> <product>ikiwiki:1.1.47</product> <product>ikiwiki:1.2</product> <product>ikiwiki:1.3</product> <product>ikiwiki:1.4</product> <product>ikiwiki:1.5</product> <product>ikiwiki:1.6</product> <product>ikiwiki:1.7</product> <product>ikiwiki:1.8</product> <product>ikiwiki:1.9</product> <product>ikiwiki:1.10</product> <product>ikiwiki:1.11</product> <product>ikiwiki:1.12</product> <product>ikiwiki:1.13</product> <product>ikiwiki:1.14</product> <product>ikiwiki:1.15</product> <product>ikiwiki:1.16</product> <product>ikiwiki:1.17</product> <product>ikiwiki:1.18</product> <product>ikiwiki:1.19</product> <product>ikiwiki:1.20</product> <product>ikiwiki:1.21</product> <product>ikiwiki:1.22</product> <product>ikiwiki:1.23</product> <product>ikiwiki:1.24</product> <product>ikiwiki:1.25</product> <product>ikiwiki:1.26</product> <product>ikiwiki:1.27</product> <product>ikiwiki:1.28</product> <product>ikiwiki:1.29</product> <product>ikiwiki:1.30</product> <product>ikiwiki:1.31</product> <product>ikiwiki:1.32</product> <product>ikiwiki:1.33.3</product> <product>ikiwiki:1.34</product> <product>ikiwiki:1.34.1</product> <product>ikiwiki:1.34.2</product> <product>ikiwiki:1.35</product> <product>ikiwiki:1.36</product> <product>ikiwiki:1.37</product> <product>ikiwiki:1.38</product> <product>ikiwiki:1.39</product> <product>ikiwiki:1.40</product> <product>ikiwiki:1.41</product> <product>ikiwiki:1.42</product> <product>ikiwiki:1.43</product> <product>ikiwiki:1.44</product> <product>ikiwiki:1.45</product> <product>ikiwiki:1.46</product> <product>ikiwiki:1.47</product> <product>ikiwiki:1.48</product> <product>ikiwiki:1.49</product> <product>ikiwiki:1.50</product> <product>ikiwiki:1.51</product> <product>ikiwiki:2.0</product> <product>ikiwiki:2.1</product> <product>ikiwiki:2.2</product> <product>ikiwiki:2.3</product> <product>ikiwiki:2.4</product> <product>ikiwiki:2.5</product> <product>ikiwiki:2.6</product> <product>ikiwiki:2.6.1</product> <product>ikiwiki:2.7</product> </cve> <cve id="CVE-2016-9643" level="LOW"> <product>webkit:2.4.11</product> </cve> <cve id="CVE-2016-9642" level="MEDIUM"> <product>webkit:-</product> </cve> <cve id="CVE-2016-10448" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10449" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10446" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10447" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10444" level="LOW"> <product>mdm9206_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10445" level="LOW"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_427_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_435_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdm630_firmware:-</product> <product>sdm636_firmware:-</product> <product>sdm660_firmware:-</product> </cve> <cve id="CVE-2016-10442" level="LOW"> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8937_firmware:-</product> <product>msm8952_firmware:-</product> <product>msm8976_firmware:-</product> <product>sdm630_firmware:-</product> <product>sdm845_firmware:-</product> </cve> <cve id="CVE-2016-10443" level="HIGH"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10440" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> </cve> <cve id="CVE-2016-10441" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-1565" level="MEDIUM"> <product>field_group:7.x-1.0</product> <product>field_group:7.x-1.0</product> <product>field_group:7.x-1.0</product> <product>field_group:7.x-1.1</product> <product>field_group:7.x-1.2</product> <product>field_group:7.x-1.3</product> <product>field_group:7.x-1.4</product> </cve> <cve id="CVE-2016-1562" level="LOW"> <product>insight:1.7.7</product> </cve> <cve id="CVE-2016-2998" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2999" level="LOW"> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2996" level="LOW"> <product>security_privileged_identity_manager:2.0.0</product> <product>security_privileged_identity_manager:2.0.1</product> <product>security_privileged_identity_manager:2.0.2</product> </cve> <cve id="CVE-2016-2997" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2994" level="MEDIUM"> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.0.201</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> </cve> <cve id="CVE-2016-2995" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2992" level="MEDIUM"> <product>biginsights:4.2</product> </cve> <cve id="CVE-2016-2991" level="MEDIUM"> <product>lotus_protector_for_mail_security:2.8</product> <product>lotus_protector_for_mail_security:2.8.1</product> </cve> <cve id="CVE-2016-1560" level="LOW"> <product>ex10000e_firmware:4.8</product> <product>ex13000e_firmware:4.8</product> <product>ex21000e_firmware:4.8</product> <product>ex3000_firmware:4.8</product> <product>ex32000e_firmware:4.8</product> <product>ex40000e_firmware:4.8</product> <product>ex5000_firmware:4.8</product> <product>ex7000_firmware:4.8</product> </cve> <cve id="CVE-2016-2196" level="LOW"> <product>botan:1.11.0</product> <product>botan:1.11.1</product> <product>botan:1.11.2</product> <product>botan:1.11.3</product> <product>botan:1.11.4</product> <product>botan:1.11.5</product> <product>botan:1.11.6</product> <product>botan:1.11.7</product> <product>botan:1.11.8</product> <product>botan:1.11.9</product> <product>botan:1.11.10</product> <product>botan:1.11.11</product> <product>botan:1.11.12</product> <product>botan:1.11.13</product> <product>botan:1.11.14</product> <product>botan:1.11.15</product> <product>botan:1.11.16</product> <product>botan:1.11.17</product> <product>botan:1.11.18</product> <product>botan:1.11.19</product> <product>botan:1.11.20</product> <product>botan:1.11.21</product> <product>botan:1.11.22</product> <product>botan:1.11.23</product> <product>botan:1.11.24</product> <product>botan:1.11.25</product> <product>botan:1.11.26</product> </cve> <cve id="CVE-2016-2197" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-2192" level="LOW"> <product>postgre_sql_pl%2fjava:1.4.3</product> </cve> <cve id="CVE-2016-2190" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> </cve> <cve id="CVE-2016-2198" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-2199" level="MEDIUM"> <product>vulnerability_manager:7.5.9</product> </cve> <cve id="CVE-2016-9210" level="LOW"> <product>unified_communications_manager:11.5%281.11007.2%29</product> </cve> <cve id="CVE-2016-9747" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> </cve> <cve id="CVE-2016-1000147" level="MEDIUM"> <product>recipes-writer:1.0.4</product> </cve> <cve id="CVE-2016-1000141" level="MEDIUM"> <product>page-layout-builder:1.9.3</product> </cve> <cve id="CVE-2016-1000143" level="MEDIUM"> <product>photoxhibit:2.1.8</product> </cve> <cve id="CVE-2016-1000142" level="MEDIUM"> <product>parsi-font:4.2.5</product> </cve> <cve id="CVE-2016-3119" level="MEDIUM"> <product>kerberos:5-1.1</product> <product>kerberos:5-1.2</product> <product>kerberos:5-1.2.1</product> <product>kerberos:5-1.2.2</product> <product>kerberos:5-1.2.3</product> <product>kerberos:5-1.2.4</product> <product>kerberos:5-1.2.5</product> <product>kerberos:5-1.2.6</product> <product>kerberos:5-1.2.7</product> <product>kerberos:5-1.2.8</product> <product>kerberos:5-1.3</product> <product>kerberos:5-1.3</product> <product>kerberos:5-1.3.1</product> <product>kerberos:5-1.3.2</product> <product>kerberos:5-1.3.3</product> <product>kerberos:5-1.3.4</product> <product>kerberos:5-1.3.5</product> <product>kerberos:5-1.3.6</product> <product>kerberos:5-1.4</product> <product>kerberos:5-1.4.1</product> <product>kerberos:5-1.4.2</product> <product>kerberos:5-1.4.3</product> <product>kerberos:5-1.4.4</product> <product>kerberos:5-1.5</product> <product>kerberos:5-1.5.1</product> <product>kerberos:5-1.5.2</product> <product>kerberos:5-1.5.3</product> <product>kerberos:5-1.6</product> <product>kerberos:5-1.6.1</product> <product>kerberos:5-1.6.2</product> <product>kerberos:5-1.7</product> <product>kerberos:5-1.7.1</product> <product>kerberos:5-1.8</product> <product>kerberos:5-1.8.1</product> <product>kerberos:5-1.8.2</product> <product>kerberos:5-1.8.3</product> <product>kerberos:5-1.8.4</product> <product>kerberos:5-1.8.5</product> <product>kerberos:5-1.8.6</product> <product>kerberos:5-1.9</product> <product>kerberos:5-1.9.1</product> <product>kerberos:5-1.9.2</product> <product>kerberos:5-1.9.3</product> <product>kerberos:5-1.9.4</product> <product>kerberos:5-1.10</product> <product>kerberos:5-1.10.1</product> <product>kerberos:5-1.10.2</product> <product>kerberos:5-1.10.3</product> <product>kerberos:5-1.10.4</product> <product>kerberos:5-1.11</product> <product>kerberos:5-1.11.1</product> <product>kerberos:5-1.11.2</product> <product>kerberos:5-1.11.3</product> <product>kerberos:5-1.11.4</product> <product>kerberos:5-1.11.5</product> <product>kerberos:5-1.12</product> <product>kerberos:5-1.12.1</product> <product>kerberos:5-1.12.2</product> <product>kerberos:5-1.12.3</product> <product>kerberos:5-1.13</product> <product>kerberos:5-1.13.1</product> <product>kerberos:5-1.13.2</product> <product>kerberos:5-1.13.3</product> <product>kerberos:5-1.13.4</product> <product>kerberos:5-1.14</product> <product>kerberos:5-1.14</product> <product>kerberos:5-1.14</product> <product>kerberos:5-1.14.0</product> <product>kerberos:5-1.14.1</product> <product>kerberos:5_1.0</product> <product>kerberos:5_1.0.6</product> <product>kerberos:5_1.1</product> <product>kerberos:5_1.1.1</product> <product>kerberos:5_1.2</product> <product>kerberos:5_1.2</product> <product>kerberos:5_1.3.3</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3118" level="LOW"> <product>api_gateway:7.1</product> <product>api_gateway:8.0</product> <product>api_gateway:8.1</product> <product>api_gateway:8.2</product> <product>api_gateway:8.3</product> <product>api_gateway:8.4</product> </cve> <cve id="CVE-2016-3111" level="LOW"> <product>pulp:2.8.2-1</product> </cve> <cve id="CVE-2016-3110" level="LOW"> <product>jboss_enterprise_web_server:2.1</product> </cve> <cve id="CVE-2016-3113" level="MEDIUM"> <product>ovirt:-</product> </cve> <cve id="CVE-2016-3112" level="LOW"> <product>pulp:2.8.2-1</product> </cve> <cve id="CVE-2016-3115" level="LOW"> <product>openssh:7.2</product> <product>vm_server:3.2</product> </cve> <cve id="CVE-2016-3114" level="LOW"> <product>kallithea:0.3.1</product> </cve> <cve id="CVE-2016-4843" level="MEDIUM"> <product>mailwise:5.0.0</product> <product>mailwise:5.0.1</product> <product>mailwise:5.0.4</product> <product>mailwise:5.0.5</product> <product>mailwise:5.0.6</product> <product>mailwise:5.1.0</product> <product>mailwise:5.1.1</product> <product>mailwise:5.1.2</product> <product>mailwise:5.1.4</product> <product>mailwise:5.2.0</product> <product>mailwise:5.2.1</product> <product>mailwise:5.3.0</product> <product>mailwise:5.3.1</product> <product>mailwise:5.3.2</product> </cve> <cve id="CVE-2016-0138" level="LOW"> <product>exchange_server:2007</product> <product>exchange_server:2010</product> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2016</product> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-0130" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7241" level="HIGH"> <product>edge</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7240" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7243" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-4837" level="LOW"> <product>coupon_plugin:1.5</product> </cve> <cve id="CVE-2016-4834" level="LOW"> <product>crm:6.4.0</product> </cve> <cve id="CVE-2016-4833" level="MEDIUM"> <product>nofollow_links:1.0.10</product> </cve> <cve id="CVE-2016-4832" level="MEDIUM"> <product>waon:1.4.1</product> </cve> <cve id="CVE-2016-4831" level="LOW"> <product>line:4.7.0</product> <product>line_installer:4.7.0</product> </cve> <cve id="CVE-2016-4830" level="MEDIUM"> <product>sushiro:2.1.16</product> <product>sushiro:2.1.16.1</product> </cve> <cve id="CVE-2016-4839" level="MEDIUM"> <product>money_forward_for_apppass:-</product> <product>money_forward_for_au_smartpass:-</product> <product>money_forward_for_chou_houdai:-</product> <product>money_forward_for_sbi_sumishin_net_bank:-</product> <product>money_forward_for_shiga_bank:-</product> <product>money_forward_for_shizuoka_bank:-</product> <product>money_forward_for_the_gunma_bank:-</product> <product>money_forward_for_the_toho_bank:-</product> <product>money_forward_for_tokai_tokyo_securities:-</product> <product>money_forward_for_ymfg:-</product> </cve> <cve id="CVE-2016-4838" level="MEDIUM"> <product>money_forward_for_apppass:-</product> <product>money_forward_for_au_smartpass:-</product> <product>money_forward_for_chou_houdai:-</product> <product>money_forward_for_sbi_sumishin_net_bank:-</product> <product>money_forward_for_shiga_bank:-</product> <product>money_forward_for_shizuoka_bank:-</product> <product>money_forward_for_the_gunma_bank:-</product> <product>money_forward_for_the_toho_bank:-</product> <product>money_forward_for_tokai_tokyo_securities:-</product> <product>money_forward_for_ymfg:-</product> </cve> <cve id="CVE-2016-7123" level="MEDIUM"> <product>mailman:2.1.14</product> </cve> <cve id="CVE-2016-9870" level="LOW"> <product>isilon_onefs:7.1.0.0</product> <product>isilon_onefs:7.1.0.1</product> <product>isilon_onefs:7.1.0.2</product> <product>isilon_onefs:7.1.0.3</product> <product>isilon_onefs:7.1.0.4</product> <product>isilon_onefs:7.1.0.5</product> <product>isilon_onefs:7.1.0.6</product> <product>isilon_onefs:7.1.1.0</product> <product>isilon_onefs:7.1.1.1</product> <product>isilon_onefs:7.1.1.2</product> <product>isilon_onefs:7.1.1.3</product> <product>isilon_onefs:7.1.1.4</product> <product>isilon_onefs:7.1.1.5</product> <product>isilon_onefs:7.1.1.6</product> <product>isilon_onefs:7.1.1.7</product> <product>isilon_onefs:7.1.1.8</product> <product>isilon_onefs:7.2.0.0</product> <product>isilon_onefs:7.2.0.1</product> <product>isilon_onefs:7.2.0.2</product> <product>isilon_onefs:7.2.0.3</product> <product>isilon_onefs:7.2.0.4</product> <product>isilon_onefs:7.2.0.5</product> <product>isilon_onefs:7.2.1.0</product> <product>isilon_onefs:7.2.1.1</product> <product>isilon_onefs:7.2.1.2</product> <product>isilon_onefs:8.0.0.0</product> </cve> <cve id="CVE-2016-9871" level="LOW"> <product>isilon_onefs:7.1.0.0</product> <product>isilon_onefs:7.1.0.5</product> <product>isilon_onefs:7.1.0.6</product> <product>isilon_onefs:7.1.1.0</product> <product>isilon_onefs:7.1.1.1</product> <product>isilon_onefs:7.1.1.2</product> <product>isilon_onefs:7.1.1.3</product> <product>isilon_onefs:7.1.1.4</product> <product>isilon_onefs:7.1.1.5</product> <product>isilon_onefs:7.1.1.6</product> <product>isilon_onefs:7.1.1.7</product> <product>isilon_onefs:7.1.1.8</product> <product>isilon_onefs:7.1.1.9</product> <product>isilon_onefs:7.1.1.10</product> <product>isilon_onefs:7.2.0.0</product> <product>isilon_onefs:7.2.0.1</product> <product>isilon_onefs:7.2.0.2</product> <product>isilon_onefs:7.2.0.3</product> <product>isilon_onefs:7.2.0.4</product> <product>isilon_onefs:7.2.1.0</product> <product>isilon_onefs:7.2.1.1</product> <product>isilon_onefs:7.2.1.2</product> <product>isilon_onefs:7.2.1.3</product> </cve> <cve id="CVE-2016-9872" level="MEDIUM"> <product>documentum_d2:4.5</product> <product>documentum_d2:4.6</product> </cve> <cve id="CVE-2016-9873" level="LOW"> <product>documentum_d2:4.5</product> <product>documentum_d2:4.6</product> </cve> <cve id="CVE-2016-9877" level="LOW"> <product>rabbitmq:1.5.0</product> <product>rabbitmq:1.5.1</product> <product>rabbitmq:1.5.2</product> <product>rabbitmq:1.5.3</product> <product>rabbitmq:1.5.4</product> <product>rabbitmq:1.5.5</product> <product>rabbitmq:1.5.6</product> <product>rabbitmq:1.5.7</product> <product>rabbitmq:1.5.8</product> <product>rabbitmq:1.5.9</product> <product>rabbitmq:1.5.10</product> <product>rabbitmq:1.5.11</product> <product>rabbitmq:1.5.12</product> <product>rabbitmq:1.5.13</product> <product>rabbitmq:1.5.14</product> <product>rabbitmq:1.5.15</product> <product>rabbitmq:1.5.17</product> <product>rabbitmq:1.5.18</product> <product>rabbitmq:1.6.0</product> <product>rabbitmq:1.6.1</product> <product>rabbitmq:1.6.2</product> <product>rabbitmq:1.6.3</product> <product>rabbitmq:1.6.4</product> <product>rabbitmq:1.6.5</product> <product>rabbitmq:1.6.6</product> <product>rabbitmq:1.6.7</product> <product>rabbitmq:1.6.8</product> <product>rabbitmq:1.6.9</product> <product>rabbitmq:1.6.10</product> <product>rabbitmq:1.7.0</product> <product>rabbitmq:1.7.2</product> <product>rabbitmq:1.7.3</product> <product>rabbitmq:1.7.4</product> <product>rabbitmq:1.7.5</product> <product>rabbitmq:1.7.6</product> <product>rabbitmq:3.0.0</product> <product>rabbitmq:3.0.1</product> <product>rabbitmq:3.0.2</product> <product>rabbitmq:3.0.3</product> <product>rabbitmq:3.0.4</product> <product>rabbitmq:3.1.0</product> <product>rabbitmq:3.1.1</product> <product>rabbitmq:3.1.2</product> <product>rabbitmq:3.1.3</product> <product>rabbitmq:3.1.4</product> <product>rabbitmq:3.1.5</product> <product>rabbitmq:3.2.0</product> <product>rabbitmq:3.2.1</product> <product>rabbitmq:3.2.2</product> <product>rabbitmq:3.2.3</product> <product>rabbitmq:3.2.4</product> <product>rabbitmq:3.3.0</product> <product>rabbitmq:3.3.1</product> <product>rabbitmq:3.3.2</product> <product>rabbitmq:3.3.3</product> <product>rabbitmq:3.3.4</product> <product>rabbitmq:3.3.5</product> <product>rabbitmq:3.4.0</product> <product>rabbitmq:3.4.1</product> <product>rabbitmq:3.4.2</product> <product>rabbitmq:3.4.3</product> <product>rabbitmq:3.4.4</product> <product>rabbitmq:3.5.0</product> <product>rabbitmq:3.5.1</product> <product>rabbitmq:3.5.2</product> <product>rabbitmq:3.5.3</product> <product>rabbitmq:3.5.4</product> <product>rabbitmq:3.5.5</product> <product>rabbitmq:3.5.6</product> <product>rabbitmq:3.5.7</product> <product>rabbitmq:3.6.0</product> <product>rabbitmq:3.6.1</product> <product>rabbitmq:3.6.2</product> <product>rabbitmq:3.6.3</product> <product>rabbitmq:3.6.4</product> <product>rabbitmq:3.6.5</product> </cve> <cve id="CVE-2016-9878" level="LOW"> <product>spring_framework:3.2.0</product> <product>spring_framework:3.2.1</product> <product>spring_framework:3.2.2</product> <product>spring_framework:3.2.3</product> <product>spring_framework:3.2.4</product> <product>spring_framework:3.2.5</product> <product>spring_framework:3.2.6</product> <product>spring_framework:3.2.7</product> <product>spring_framework:3.2.8</product> <product>spring_framework:3.2.9</product> <product>spring_framework:3.2.10</product> <product>spring_framework:3.2.11</product> <product>spring_framework:3.2.12</product> <product>spring_framework:3.2.13</product> <product>spring_framework:3.2.14</product> <product>spring_framework:3.2.15</product> <product>spring_framework:3.2.16</product> <product>spring_framework:3.2.17</product> <product>spring_framework:4.2.0</product> <product>spring_framework:4.2.1</product> <product>spring_framework:4.2.2</product> <product>spring_framework:4.2.3</product> <product>spring_framework:4.2.4</product> <product>spring_framework:4.2.5</product> <product>spring_framework:4.2.6</product> <product>spring_framework:4.2.7</product> <product>spring_framework:4.2.8</product> <product>spring_framework:4.3.0</product> <product>spring_framework:4.3.1</product> <product>spring_framework:4.3.2</product> <product>spring_framework:4.3.3</product> <product>spring_framework:4.3.4</product> </cve> <cve id="CVE-2016-9879" level="LOW"> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>spring_security:3.2.0</product> <product>spring_security:3.2.1</product> <product>spring_security:3.2.2</product> <product>spring_security:3.2.3</product> <product>spring_security:3.2.4</product> <product>spring_security:3.2.5</product> <product>spring_security:3.2.6</product> <product>spring_security:3.2.7</product> <product>spring_security:3.2.8</product> <product>spring_security:3.2.9</product> <product>spring_security:4.1.0</product> <product>spring_security:4.1.1</product> <product>spring_security:4.1.2</product> <product>spring_security:4.1.3</product> <product>spring_security:4.2.0</product> </cve> <cve id="CVE-2016-10143" level="LOW"> <product>tikiwiki_cms%2fgroupware:15.2</product> </cve> <cve id="CVE-2016-10634" level="MEDIUM"> <product>scalajs-standalone-bin:0.4.3</product> </cve> <cve id="CVE-2016-10637" level="MEDIUM"> <product>haxe-dev:-</product> </cve> <cve id="CVE-2016-10636" level="MEDIUM"> <product>grunt-ccompiler:-</product> </cve> <cve id="CVE-2016-10631" level="MEDIUM"> <product>jvminstall:0.1.0</product> </cve> <cve id="CVE-2016-10630" level="MEDIUM"> <product>install-g-test:2.0.12</product> </cve> <cve id="CVE-2016-10633" level="MEDIUM"> <product>dwebp-bin:0.1.6</product> </cve> <cve id="CVE-2016-10144" level="LOW"> <product>imagemagick</product> </cve> <cve id="CVE-2016-10639" level="MEDIUM"> <product>redis-srvr:-</product> </cve> <cve id="CVE-2016-10638" level="MEDIUM"> <product>js-given:-</product> </cve> <cve id="CVE-2016-8699" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8698" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8697" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8696" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8695" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8694" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8693" level="MEDIUM"> <product>jasper:1.900.5</product> <product>fedora:23</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-8690" level="MEDIUM"> <product>jasper:1.900.29</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-1265" level="LOW"> <product>junos_space:15.1r2</product> </cve> <cve id="CVE-2016-1264" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x50</product> <product>junos:12.3x50</product> <product>junos:12.3x50</product> <product>junos:12.3x50</product> <product>junos:12.3x50</product> <product>junos:12.3x50</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x52</product> <product>junos:13.2x52</product> <product>junos:13.2x52</product> <product>junos:13.2x52</product> <product>junos:13.2x52</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:16.1</product> </cve> <cve id="CVE-2016-1267" level="MEDIUM"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:16.1</product> </cve> <cve id="CVE-2016-1261" level="MEDIUM"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-1260" level="LOW"> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:15.2</product> </cve> <cve id="CVE-2016-1263" level="LOW"> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-1262" level="MEDIUM"> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-1269" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> </cve> <cve id="CVE-2016-1268" level="LOW"> <product>screenos:6.3.0</product> </cve> <cve id="CVE-2016-9256" level="MEDIUM"> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> </cve> <cve id="CVE-2016-9257" level="MEDIUM"> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> </cve> <cve id="CVE-2016-9250" level="LOW"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:11.2.1</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-9251" level="LOW"> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> </cve> <cve id="CVE-2016-9252" level="LOW"> <product>big-ip_access_policy_manager:10.2.1</product> <product>big-ip_access_policy_manager:10.2.2</product> <product>big-ip_access_policy_manager:10.2.3</product> <product>big-ip_access_policy_manager:10.2.4</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_security_manager:10.2.1</product> <product>big-ip_application_security_manager:10.2.2</product> <product>big-ip_application_security_manager:10.2.3</product> <product>big-ip_application_security_manager:10.2.4</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_edge_gateway:10.2.1</product> <product>big-ip_edge_gateway:10.2.2</product> <product>big-ip_edge_gateway:10.2.3</product> <product>big-ip_edge_gateway:10.2.4</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:10.2.1</product> <product>big-ip_global_traffic_manager:10.2.2</product> <product>big-ip_global_traffic_manager:10.2.3</product> <product>big-ip_global_traffic_manager:10.2.4</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:10.2.1</product> <product>big-ip_link_controller:10.2.2</product> <product>big-ip_link_controller:10.2.3</product> <product>big-ip_link_controller:10.2.4</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_local_traffic_manager:10.2.1</product> <product>big-ip_local_traffic_manager:10.2.2</product> <product>big-ip_local_traffic_manager:10.2.3</product> <product>big-ip_local_traffic_manager:10.2.4</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_webaccelerator:10.2.1</product> <product>big-ip_webaccelerator:10.2.2</product> <product>big-ip_webaccelerator:10.2.3</product> <product>big-ip_webaccelerator:10.2.4</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_protocol_security_manager:10.2.1</product> <product>big-ip_protocol_security_manager:10.2.2</product> <product>big-ip_protocol_security_manager:10.2.3</product> <product>big-ip_protocol_security_manager:10.2.4</product> <product>big-ip_protocol_security_manager:11.2.1</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-9253" level="LOW"> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> </cve> <cve id="CVE-2016-9259" level="MEDIUM"> <product>nessus:6.8</product> <product>nessus:6.8.1</product> <product>nessus:6.8.2</product> <product>nessus:6.9</product> </cve> <cve id="CVE-2016-1401" level="MEDIUM"> <product>unified_computing_system_central_software:1.4%281a%29</product> </cve> <cve id="CVE-2016-1400" level="LOW"> <product>telepresence_video_communication_server:x8.1.1</product> <product>telepresence_video_communication_server:x8.1.2</product> <product>telepresence_video_communication_server:x8.1_base</product> <product>telepresence_video_communication_server:x8.2.1</product> <product>telepresence_video_communication_server:x8.2.2</product> <product>telepresence_video_communication_server:x8.2_base</product> <product>telepresence_video_communication_server:x8.5</product> <product>telepresence_video_communication_server:x8.5.0</product> <product>telepresence_video_communication_server:x8.5.1</product> <product>telepresence_video_communication_server:x8.5.2</product> <product>telepresence_video_communication_server:x8.5.3</product> <product>telepresence_video_communication_server:x8.6.0</product> <product>telepresence_video_communication_server:x8.6.1</product> </cve> <cve id="CVE-2016-1403" level="LOW"> <product>ip_phone_8800_series_firmware:10.2%281%29</product> <product>ip_phone_8800_series_firmware:10.2%282%29</product> <product>ip_phone_8800_series_firmware:10.3</product> <product>ip_phone_8800_series_firmware:10.3%282%29</product> <product>ip_phone_8800_series_firmware:11.0%281%29</product> </cve> <cve id="CVE-2016-1402" level="LOW"> <product>identity_services_engine_software:1.2.0.899</product> <product>identity_services_engine_software:1.2.0.899</product> <product>identity_services_engine_software:1.2.0.899</product> <product>identity_services_engine_software:1.2.0.899</product> <product>identity_services_engine_software:1.2.0.899</product> <product>identity_services_engine_software:1.2.0.899</product> </cve> <cve id="CVE-2016-1405" level="LOW"> <product>email_security_appliance:9.6.0-042</product> <product>web_security_appliance:8.8.0-085</product> <product>web_security_appliance:9.1.0-070</product> <product>web_security_appliance:9.5.0-284</product> <product>clamav</product> </cve> <cve id="CVE-2016-1404" level="LOW"> <product>ucs_invicta_c3124sa_appliance:4.3.1</product> <product>ucs_invicta_c3124sa_appliance:4.3_base</product> <product>ucs_invicta_c3124sa_appliance:4.5.0</product> <product>ucs_invicta_c3124sa_appliance:4.5_base</product> <product>ucs_invicta_c3124sa_appliance:5.0.1</product> <product>ucs_invicta_c3124sa_appliance:5.0_base</product> </cve> <cve id="CVE-2016-4167" level="LOW"> <product>dng_software_development_kit:1.4.2012</product> </cve> <cve id="CVE-2016-1406" level="LOW"> <product>evolved_programmable_network_manager:1.2.0</product> <product>evolved_programmable_network_manager:1.2.1.3</product> <product>evolved_programmable_network_manager:1.2.200</product> <product>evolved_programmable_network_manager:1.2.300</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2%282%29</product> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:3.0.0</product> <product>prime_infrastructure:3.0_base</product> </cve> <cve id="CVE-2016-4169" level="LOW"> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-1408" level="LOW"> <product>evolved_programmable_network_manager:1.2.0</product> <product>evolved_programmable_network_manager:1.2.1.3</product> <product>evolved_programmable_network_manager:1.2.200</product> <product>evolved_programmable_network_manager:1.2.300</product> <product>evolved_programmable_network_manager:1.2.400</product> <product>evolved_programmable_network_manager:1.2.500</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2%282%29</product> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:3.0.0</product> <product>prime_infrastructure:3.0_base</product> <product>prime_infrastructure:3.1.0</product> <product>prime_infrastructure:3.1_base</product> </cve> <cve id="CVE-2016-6500" level="MEDIUM"> <product>racf_connector:1.1.0.0</product> </cve> <cve id="CVE-2016-3028" level="LOW"> <product>security_access_manager:9.0.0</product> <product>security_access_manager:9.0.0.1</product> <product>security_access_manager:9.0.1.0</product> <product>security_access_manager_for_web:7.0.0</product> <product>security_access_manager_for_web:8.0.0</product> <product>security_access_manager_for_web:8.0.0.2</product> <product>security_access_manager_for_web:8.0.0.4</product> <product>security_access_manager_for_web:8.0.0.5</product> <product>security_access_manager_for_web:8.0.1</product> <product>security_access_manager_for_web:8.0.1.2</product> <product>security_access_manager_for_web:8.0.1.3</product> <product>security_access_manager_for_web:8.0.1.4</product> </cve> <cve id="CVE-2016-5562" level="MEDIUM"> <product>iprocurement:12.1.1</product> <product>iprocurement:12.1.2</product> <product>iprocurement:12.1.3</product> <product>iprocurement:12.2.3</product> <product>iprocurement:12.2.4</product> <product>iprocurement:12.2.5</product> <product>iprocurement:12.2.6</product> </cve> <cve id="CVE-2016-5563" level="MEDIUM"> <product>hospitality_opera_5_property_services:5.4.0.0</product> <product>hospitality_opera_5_property_services:5.4.1.0</product> <product>hospitality_opera_5_property_services:5.4.2.0</product> <product>hospitality_opera_5_property_services:5.4.3.0</product> <product>hospitality_opera_5_property_services:5.5.0.0</product> <product>hospitality_opera_5_property_services:5.5.1.0</product> </cve> <cve id="CVE-2016-5560" level="LOW"> <product>siebel_customer_order_management:16.1</product> </cve> <cve id="CVE-2016-5567" level="LOW"> <product>applications_dba:12.1.3</product> <product>applications_dba:12.2.3</product> <product>applications_dba:12.2.4</product> <product>applications_dba:12.2.5</product> <product>applications_dba:12.2.6</product> </cve> <cve id="CVE-2016-5564" level="LOW"> <product>hospitality_opera_5_property_services:5.4.0.0</product> <product>hospitality_opera_5_property_services:5.4.1.0</product> <product>hospitality_opera_5_property_services:5.4.2.0</product> <product>hospitality_opera_5_property_services:5.4.3.0</product> <product>hospitality_opera_5_property_services:5.5.0.0</product> <product>hospitality_opera_5_property_services:5.5.1.0</product> </cve> <cve id="CVE-2016-5565" level="LOW"> <product>hospitality_opera_5_property_services:5.4.0.0</product> <product>hospitality_opera_5_property_services:5.4.1.0</product> <product>hospitality_opera_5_property_services:5.4.2.0</product> <product>hospitality_opera_5_property_services:5.4.3.0</product> <product>hospitality_opera_5_property_services:5.5.0.0</product> <product>hospitality_opera_5_property_services:5.5.1.0</product> </cve> <cve id="CVE-2016-5568" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5569" level="LOW"> <product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product> <product>flexcube_enterprise_limits_and_collateral_management:12.1.0</product> </cve> <cve id="CVE-2016-3474" level="MEDIUM"> <product>business_intelligence_publisher:11.1.1.7.0</product> <product>business_intelligence_publisher:11.1.1.9.0</product> <product>business_intelligence_publisher:12.2.1.0.0</product> </cve> <cve id="CVE-2016-2039" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:23</product> <product>fedora:24</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2038" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2034" level="LOW"> <product>clearpass:6.5.0</product> <product>clearpass:6.5.1</product> <product>clearpass:6.5.2</product> <product>clearpass:6.5.3</product> <product>clearpass:6.5.4</product> <product>clearpass:6.5.5</product> <product>clearpass:6.5.6</product> <product>clearpass:6.6.0</product> </cve> <cve id="CVE-2016-2036" level="LOW"> <product>galaxy_note_3_firmware:n9005xxugbob6</product> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-2030" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-6866" level="LOW"> <product>slock:1.3</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7278" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-5966" level="MEDIUM"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-3638" level="LOW"> <product>sld_registration:-</product> </cve> <cve id="CVE-2016-3639" level="LOW"> <product>hana_db:1.00.091.00.1418659308</product> </cve> <cve id="CVE-2016-3634" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3635" level="MEDIUM"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-3631" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3632" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> </cve> <cve id="CVE-2016-3633" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3322" level="HIGH"> <product>edge</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3321" level="MEDIUM"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3326" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3327" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3324" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3325" level="HIGH"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3329" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-5963" level="LOW"> <product>security_privileged_identity_manager_virtual_appliance:2.0</product> </cve> <cve id="CVE-2016-7866" level="LOW"> <product>animate:15.2.1.95</product> </cve> <cve id="CVE-2016-0679" level="LOW"> <product>peoplesoft_enterprise_peopletools:8</product> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.55</product> <product>peoplesoft_enterprise_peopletools:54</product> </cve> <cve id="CVE-2016-0678" level="MEDIUM"> <product>vm_virtualbox:5.0.18</product> </cve> <cve id="CVE-2016-7809" level="MEDIUM"> <product>cg-wlr300nx_firmware:1.20</product> </cve> <cve id="CVE-2016-7808" level="MEDIUM"> <product>cg-wlbaragm_firmware:-</product> <product>cg-wlbargnl_firmware:-</product> </cve> <cve id="CVE-2016-7807" level="LOW"> <product>wfs-sr01_firmware:1.10</product> </cve> <cve id="CVE-2016-7806" level="LOW"> <product>wfs-sr01_firmware:1.10</product> </cve> <cve id="CVE-2016-7805" level="MEDIUM"> <product>mobigate:2.2.1.2</product> <product>mobigate:2.2.4.1</product> </cve> <cve id="CVE-2016-7804" level="MEDIUM"> <product>7-zip:16.02</product> </cve> <cve id="CVE-2016-7803" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-7802" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-0673" level="MEDIUM"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> </cve> <cve id="CVE-2016-0672" level="LOW"> <product>flexcube_direct_banking:12.0.2</product> <product>flexcube_direct_banking:12.0.3</product> </cve> <cve id="CVE-2016-9409" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9408" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9401" level="LOW"> <product>bash</product> </cve> <cve id="CVE-2016-9400" level="LOW"> <product>teeworlds:0.6.3</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-9403" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9402" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9405" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9404" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9407" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9406" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-5959" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-5774" level="MEDIUM"> <product>packetshaper_s-series:11.5.1</product> <product>packetshaper_s-series:11.5.1.2</product> <product>packetshaper_s-series:11.5.1.3</product> <product>packetshaper_s-series:11.5.2</product> <product>packetshaper_s-series:11.5.3</product> </cve> <cve id="CVE-2016-8319" level="MEDIUM"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-8316" level="MEDIUM"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-8317" level="MEDIUM"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-8314" level="MEDIUM"> <product>flexcube_core_banking:5.1.0</product> <product>flexcube_core_banking:5.2.0</product> <product>flexcube_core_banking:11.5.0</product> </cve> <cve id="CVE-2016-8315" level="LOW"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-8312" level="MEDIUM"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-8313" level="MEDIUM"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-8310" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5954" level="LOW"> <product>websphere_portal:6.1.0.0</product> <product>websphere_portal:6.1.0.1</product> <product>websphere_portal:6.1.0.2</product> <product>websphere_portal:6.1.0.3</product> <product>websphere_portal:6.1.0.4</product> <product>websphere_portal:6.1.0.5</product> <product>websphere_portal:6.1.0.6</product> <product>websphere_portal:6.1.5.0</product> <product>websphere_portal:6.1.5.1</product> <product>websphere_portal:6.1.5.2</product> <product>websphere_portal:6.1.5.3</product> <product>websphere_portal:7.0.0.0</product> <product>websphere_portal:7.0.0.1</product> <product>websphere_portal:7.0.0.2</product> <product>websphere_portal:8.0.0.0</product> <product>websphere_portal:8.0.0.1</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-3479" level="LOW"> <product>database:11.2.0.4</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-10469" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10460" level="LOW"> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10461" level="LOW"> <product>mdm9650_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10462" level="LOW"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_427_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_435_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdm630_firmware:-</product> <product>sdm636_firmware:-</product> <product>sdm660_firmware:-</product> </cve> <cve id="CVE-2016-10464" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>qca6174a_firmware:-</product> <product>qca6574au_firmware:-</product> <product>qca9377_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10466" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10467" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-4576" level="LOW"> <product>ips_module_firmware:v500r001c00</product> <product>ngfw_module_firmware:v500r001c00</product> <product>nip6300_firmware:v500r001c00</product> <product>nip6600_firmware:v500r001c00</product> <product>secospace_antiddos8000_firmware:v500r001c00</product> <product>secospace_usg6300_firmware:v500r001c00</product> <product>secospace_usg6500_firmware:v500r001c00</product> <product>secospace_usg6600_firmware:v500r001c00</product> <product>usg9500_firmware:v500r001c00</product> </cve> <cve id="CVE-2016-4577" level="HIGH"> <product>ngfw_module_firmware:v500r001c00</product> <product>secospace_usg6300_firmware:v500r001c00</product> <product>secospace_usg6500_firmware:v500r001c00</product> <product>secospace_usg6600_firmware:v500r001c00</product> <product>usg9500_firmware:v500r001c00</product> </cve> <cve id="CVE-2016-1094" level="LOW"> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>acrobat_xi:11.0.15</product> <product>reader_xi:11.0.15</product> </cve> <cve id="CVE-2016-4575" level="MEDIUM"> <product>ath:-</product> <product>cherryplus:-</product> <product>ath_firmware:al00c00</product> <product>ath_firmware:cl00c92</product> <product>ath_firmware:tl00hc01</product> <product>ath_firmware:ul00c00</product> <product>cherryplus_firmware:tl00c00</product> <product>cherryplus_firmware:tl00mc01</product> <product>cherryplus_firmware:ul00c00</product> <product>plk_firmware:al10c00</product> <product>plk_firmware:al10c92</product> <product>rio_firmware:al00c00</product> </cve> <cve id="CVE-2016-1092" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4573" level="LOW"> <product>fortiswitch:3.4.1</product> </cve> <cve id="CVE-2016-4570" level="MEDIUM"> <product>mini-xml:2.7</product> <product>mini-xml:2.9</product> </cve> <cve id="CVE-2016-4571" level="MEDIUM"> <product>mini-xml:2.7</product> <product>mini-xml:2.9</product> </cve> <cve id="CVE-2016-2206" level="LOW"> <product>workspace_streaming:7.5.0</product> <product>workspace_streaming:7.5.0</product> <product>workspace_streaming:7.6.0</product> <product>workspace_virtualization:7.5.0</product> <product>workspace_virtualization:7.5.0</product> <product>workspace_virtualization:7.6.0</product> </cve> <cve id="CVE-2016-2207" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-2204" level="LOW"> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> </cve> <cve id="CVE-2016-2205" level="LOW"> <product>workspace_streaming:7.5.0</product> <product>workspace_streaming:7.5.0</product> <product>workspace_streaming:7.6.0</product> <product>workspace_virtualization:7.5.0</product> <product>workspace_virtualization:7.5.0</product> <product>workspace_virtualization:7.6.0</product> </cve> <cve id="CVE-2016-2202" level="LOW"> <product>altiris_it_management_suite:7.6</product> </cve> <cve id="CVE-2016-2203" level="LOW"> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> <product>messaging_gateway:10.6.0</product> </cve> <cve id="CVE-2016-2200" level="LOW"> <product>simatic_s7-1500_cpu_firmware:1.8.2</product> </cve> <cve id="CVE-2016-2201" level="LOW"> <product>simatic_s7-1500_cpu_firmware:1.8.2</product> </cve> <cve id="CVE-2016-2208" level="LOW"> <product>anti-virus_engine:20151.1.0.32</product> </cve> <cve id="CVE-2016-2209" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-7012" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6430" level="MEDIUM"> <product>ip_interoperability_and_collaboration_system:4.0%281%29</product> <product>ip_interoperability_and_collaboration_system:4.5%281%29</product> <product>ip_interoperability_and_collaboration_system:4.6%281%29</product> <product>ip_interoperability_and_collaboration_system:4.7%281%29</product> <product>ip_interoperability_and_collaboration_system:4.8%281%29</product> <product>ip_interoperability_and_collaboration_system:4.8%282%29</product> <product>ip_interoperability_and_collaboration_system:4.9%281%29</product> <product>ip_interoperability_and_collaboration_system:4.9%282%29</product> <product>ip_interoperability_and_collaboration_system:4.10%281%29</product> </cve> <cve id="CVE-2016-1116" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-7906" level="MEDIUM"> <product>imagemagick:7.0.3-2</product> </cve> <cve id="CVE-2016-0227" level="MEDIUM"> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> </cve> <cve id="CVE-2016-0224" level="LOW"> <product>marketing_platform:8.5.0.0</product> <product>marketing_platform:8.5.0.1</product> <product>marketing_platform:8.5.0.2</product> <product>marketing_platform:8.5.0.3</product> <product>marketing_platform:8.5.0.4</product> <product>marketing_platform:8.5.0.5</product> <product>marketing_platform:8.5.0.6</product> <product>marketing_platform:8.5.0.7</product> <product>marketing_platform:8.6.0.0</product> <product>marketing_platform:8.6.0.1</product> <product>marketing_platform:8.6.0.2</product> <product>marketing_platform:8.6.0.3</product> <product>marketing_platform:8.6.0.4</product> <product>marketing_platform:8.6.0.5</product> <product>marketing_platform:8.6.0.6</product> <product>marketing_platform:8.6.0.7</product> <product>marketing_platform:8.6.0.8</product> <product>marketing_platform:8.6.0.9</product> <product>marketing_platform:8.6.0.10</product> <product>marketing_platform:8.6.0.11</product> <product>marketing_platform:9.0.0.0</product> <product>marketing_platform:9.0.0.1</product> <product>marketing_platform:9.0.0.2</product> <product>marketing_platform:9.0.0.3</product> <product>marketing_platform:9.0.0.4</product> <product>marketing_platform:9.1.0.0</product> <product>marketing_platform:9.1.0.1</product> <product>marketing_platform:9.1.0.2</product> <product>marketing_platform:9.1.0.3</product> <product>marketing_platform:9.1.0.4</product> <product>marketing_platform:9.1.0.5</product> <product>marketing_platform:9.1.0.6</product> <product>marketing_platform:9.1.0.7</product> <product>marketing_platform:9.1.0.8</product> <product>marketing_platform:9.1.0.9</product> <product>marketing_platform:9.1.0.10</product> <product>marketing_platform:9.1.1.0</product> <product>marketing_platform:9.1.1.1</product> <product>marketing_platform:9.1.1.2</product> <product>marketing_platform:9.1.1.3</product> <product>marketing_platform:9.1.1.4</product> <product>marketing_platform:9.1.2.0</product> </cve> <cve id="CVE-2016-0590" level="MEDIUM"> <product>peoplesoft_supply_chain_management_order_management:9.1</product> <product>peoplesoft_supply_chain_management_order_management:9.2</product> </cve> <cve id="CVE-2016-7903" level="MEDIUM"> <product>dotclear:2.10.2</product> </cve> <cve id="CVE-2016-7017" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6457" level="LOW"> <product>application_policy_infrastructure_controller:1.2%282%29</product> <product>application_policy_infrastructure_controller:1.2%283%29</product> <product>application_policy_infrastructure_controller:1.3%281%29</product> <product>application_policy_infrastructure_controller:1.3%282%29</product> <product>application_policy_infrastructure_controller:2.0%281%29</product> <product>nx-os:11.2%282g%29</product> <product>nx-os:11.2%282h%29</product> <product>nx-os:11.2%282i%29</product> <product>nx-os:11.2%283c%29</product> <product>nx-os:11.2%283e%29</product> <product>nx-os:11.2%283h%29</product> <product>nx-os:11.3%281i%29</product> <product>nx-os:11.3%282f%29</product> <product>nx-os:11.3%282h%29</product> <product>nx-os:11.3%282i%29</product> <product>nx-os:12.0%281m%29</product> <product>nx-os:12.0%281n%29</product> <product>nx-os:12.0%281o%29</product> <product>nx-os:12.0%281p%29</product> <product>nx-os:12.0%281q%29</product> </cve> <cve id="CVE-2016-6455" level="LOW"> <product>asr_5000_software:18.0.0</product> <product>asr_5000_software:18.0.0.57828</product> <product>asr_5000_software:18.0.0.59167</product> <product>asr_5000_software:18.0.0.59211</product> <product>asr_5000_software:18.0.l0.59219</product> <product>asr_5000_software:18.1.0</product> <product>asr_5000_software:18.1.0.59776</product> <product>asr_5000_software:18.1.0.59780</product> <product>asr_5000_software:18.1_base</product> <product>asr_5000_software:18.3.0</product> <product>asr_5000_software:18.3_base</product> <product>asr_5000_software:18.4.0</product> <product>asr_5000_software:19.0.1</product> <product>asr_5000_software:19.0.m0.60737</product> <product>asr_5000_software:19.0.m0.60828</product> <product>asr_5000_software:19.0.m0.61045</product> <product>asr_5000_software:19.1.0</product> <product>asr_5000_software:19.1.0.61559</product> <product>asr_5000_software:19.2.0</product> <product>asr_5000_software:19.3.0</product> <product>asr_5000_software:20.0.0</product> </cve> <cve id="CVE-2016-6454" level="MEDIUM"> <product>hosted_collaboration_mediation_fulfillment:10.6%281%29.0</product> <product>hosted_collaboration_mediation_fulfillment:10.6%282%29.0</product> <product>hosted_collaboration_mediation_fulfillment:10.6%283%29.0</product> <product>hosted_collaboration_mediation_fulfillment:11.5%281%29.0</product> </cve> <cve id="CVE-2016-6453" level="MEDIUM"> <product>identity_services_engine:1.3%280.876%29</product> </cve> <cve id="CVE-2016-6320" level="MEDIUM"> <product>foreman:1.12.1</product> </cve> <cve id="CVE-2016-6451" level="MEDIUM"> <product>prime_collaboration_provisioning:10.6.0</product> </cve> <cve id="CVE-2016-6322" level="LOW"> <product>quickstart_cloud_installer:-</product> </cve> <cve id="CVE-2016-7909" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-6329" level="MEDIUM"> <product>openvpn:2.3.14</product> </cve> <cve id="CVE-2016-6459" level="LOW"> <product>telepresence_tc_software:7.1.0</product> <product>telepresence_tc_software:7.1.1</product> <product>telepresence_tc_software:7.1.2</product> <product>telepresence_tc_software:7.1.3</product> <product>telepresence_tc_software:7.1.4</product> <product>telepresence_tc_software:7.3.0</product> <product>telepresence_tc_software:7.3.1</product> <product>telepresence_tc_software:7.3.2</product> <product>telepresence_tc_software:7.3.3</product> <product>telepresence_tc_software:8.0.0</product> <product>telepresence_tc_software:8.1.0</product> </cve> <cve id="CVE-2016-6458" level="LOW"> <product>email_security_appliance_firmware:9.7.1-066</product> <product>email_security_appliance_firmware:9.7.2-046</product> <product>email_security_appliance_firmware:9.7.2-047</product> <product>email_security_appliance_firmware:9.7.2-054</product> <product>email_security_appliance_firmware:9.9.6-026</product> <product>email_security_appliance_firmware:9.9_base</product> <product>email_security_appliance_firmware:10.0.0-124</product> <product>email_security_appliance_firmware:10.0.0-125</product> </cve> <cve id="CVE-2016-0110" level="HIGH"> <product>edge</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0111" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0112" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0113" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7490" level="LOW"> <product>studio_express:15.12.00.00</product> </cve> <cve id="CVE-2016-0443" level="MEDIUM"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-0116" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-0441" level="HIGH"> <product>fusion_middleware:3.1.2</product> </cve> <cve id="CVE-2016-7498" level="LOW"> <product>compute_%28nova%29:13.0.0</product> </cve> <cve id="CVE-2016-7499" level="MEDIUM"> <product>libav:11.7</product> </cve> <cve id="CVE-2016-0449" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-5391" level="LOW"> <product>libreswan:3.17</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-5826" level="LOW"> <product>libical:0.47</product> <product>libical:1.0</product> </cve> <cve id="CVE-2016-5825" level="MEDIUM"> <product>libical:0.47</product> <product>libical:1.0</product> </cve> <cve id="CVE-2016-5824" level="MEDIUM"> <product>libical:1.0</product> </cve> <cve id="CVE-2016-5823" level="MEDIUM"> <product>libical:0.47</product> <product>libical:1.0</product> </cve> <cve id="CVE-2016-5822" level="LOW"> <product>oceanstor_5800_v3:v300r002c10</product> </cve> <cve id="CVE-2016-5821" level="LOW"> <product>hisuite:4.0.3.301</product> </cve> <cve id="CVE-2016-7140" level="MEDIUM"> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-7141" level="LOW"> <product>libcurl:7.50.1</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-7146" level="MEDIUM"> <product>moinmoin:1.9.8</product> </cve> <cve id="CVE-2016-7147" level="MEDIUM"> <product>plone:2.5.5</product> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1</product> <product>plone:5.1</product> </cve> <cve id="CVE-2016-7144" level="MEDIUM"> <product>unrealircd:3.2.10.5</product> <product>unrealircd:4.0.0</product> <product>unrealircd:4.0.1</product> <product>unrealircd:4.0.2</product> <product>unrealircd:4.0.3</product> <product>unrealircd:4.0.3.1</product> <product>unrealircd:4.0.4</product> <product>unrealircd:4.0.5</product> </cve> <cve id="CVE-2016-7145" level="LOW"> <product>nefarious2:2.0</product> </cve> <cve id="CVE-2016-7148" level="MEDIUM"> <product>moinmoin:1.9.8</product> </cve> <cve id="CVE-2016-7149" level="MEDIUM"> <product>b2evolution:6.7.5</product> </cve> <cve id="CVE-2016-10619" level="MEDIUM"> <product>pennyworth:1.0.1</product> </cve> <cve id="CVE-2016-10618" level="MEDIUM"> <product>node-browser:0.0.3</product> </cve> <cve id="CVE-2016-10617" level="MEDIUM"> <product>box2d-native:0.0.8</product> </cve> <cve id="CVE-2016-10616" level="MEDIUM"> <product>openframe-image:0.2.0</product> </cve> <cve id="CVE-2016-10615" level="MEDIUM"> <product>curses:0.0.10</product> </cve> <cve id="CVE-2016-10614" level="MEDIUM"> <product>httpsync:-</product> </cve> <cve id="CVE-2016-10613" level="MEDIUM"> <product>bionode-sra:1.0.3</product> </cve> <cve id="CVE-2016-10612" level="MEDIUM"> <product>dalekjs:0.0.5</product> </cve> <cve id="CVE-2016-10611" level="MEDIUM"> <product>strider-sauce:0.6.3</product> </cve> <cve id="CVE-2016-8675" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-8674" level="MEDIUM"> <product>mupdf:1.9a</product> </cve> <cve id="CVE-2016-8676" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-8671" level="MEDIUM"> <product>matrixssl:3.8.6</product> </cve> <cve id="CVE-2016-8670" level="LOW"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-8673" level="MEDIUM"> <product>simatic_cp_343-1_firmware:-</product> <product>simatic_cp_443-1_firmware:-</product> <product>simatic_s7_300_cpu_firmware:-</product> <product>simatic_s7_400_cpu_firmware:-</product> </cve> <cve id="CVE-2016-8672" level="LOW"> <product>simatic_cp_343-1_firmware:-</product> <product>simatic_cp_443-1_firmware:-</product> <product>simatic_s7_300_cpu_firmware:-</product> <product>simatic_s7_400_cpu_firmware:-</product> </cve> <cve id="CVE-2016-8679" level="MEDIUM"> <product>libdwarf:20161124</product> </cve> <cve id="CVE-2016-8678" level="MEDIUM"> <product>imagemagick:7.0.3-0</product> </cve> <cve id="CVE-2016-4363" level="MEDIUM"> <product>insight_control_server_deployment:-</product> </cve> <cve id="CVE-2016-1242" level="LOW"> <product>tryton:3.2.0</product> <product>tryton:3.2.16</product> <product>tryton:3.4.0</product> <product>tryton:3.4.1</product> <product>tryton:3.4.2</product> <product>tryton:3.4.3</product> <product>tryton:3.4.4</product> <product>tryton:3.4.5</product> <product>tryton:3.4.6</product> <product>tryton:3.4.7</product> <product>tryton:3.4.8</product> <product>tryton:3.4.9</product> <product>tryton:3.4.10</product> <product>tryton:3.4.11</product> <product>tryton:3.4.12</product> <product>tryton:3.4.13</product> <product>tryton:3.6.0</product> <product>tryton:3.6.1</product> <product>tryton:3.6.2</product> <product>tryton:3.6.3</product> <product>tryton:3.6.4</product> <product>tryton:3.6.5</product> <product>tryton:3.6.6</product> <product>tryton:3.6.7</product> <product>tryton:3.6.8</product> <product>tryton:3.6.9</product> <product>tryton:3.6.10</product> <product>tryton:3.6.11</product> <product>tryton:3.8.0</product> <product>tryton:3.8.1</product> <product>tryton:3.8.2</product> <product>tryton:3.8.3</product> <product>tryton:3.8.4</product> <product>tryton:3.8.5</product> <product>tryton:3.8.6</product> <product>tryton:3.8.7</product> <product>tryton:4.0.0</product> <product>tryton:4.0.1</product> <product>tryton:4.0.2</product> <product>tryton:4.0.3</product> </cve> <cve id="CVE-2016-4361" level="LOW"> <product>loadrunner:11.52</product> <product>loadrunner:12.00</product> <product>loadrunner:12.01</product> <product>loadrunner:12.02</product> <product>loadrunner:12.50</product> <product>performance_center:11.52</product> <product>performance_center:12.00</product> <product>performance_center:12.01</product> <product>performance_center:12.20</product> <product>performance_center:12.50</product> </cve> <cve id="CVE-2016-4360" level="LOW"> <product>loadrunner:11.52</product> <product>loadrunner:12.00</product> <product>loadrunner:12.01</product> <product>loadrunner:12.02</product> <product>loadrunner:12.50</product> <product>performance_center:11.52</product> <product>performance_center:12.00</product> <product>performance_center:12.01</product> <product>performance_center:12.20</product> <product>performance_center:12.50</product> </cve> <cve id="CVE-2016-4367" level="LOW"> <product>universal_cmbd_foundation:10.0</product> <product>universal_cmbd_foundation:10.01</product> <product>universal_cmbd_foundation:10.10</product> <product>universal_cmbd_foundation:10.11</product> <product>universal_cmbd_foundation:10.20</product> <product>universal_cmbd_foundation:10.21</product> </cve> <cve id="CVE-2016-4366" level="LOW"> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-4365" level="LOW"> <product>insight_control_server_deployment:-</product> </cve> <cve id="CVE-2016-4364" level="LOW"> <product>insight_control_server_deployment:-</product> </cve> <cve id="CVE-2016-4369" level="LOW"> <product>discovery_and_dependency_mapping_inventory:9.30</product> <product>discovery_and_dependency_mapping_inventory:9.31</product> <product>discovery_and_dependency_mapping_inventory:9.32</product> </cve> <cve id="CVE-2016-4368" level="LOW"> <product>universal_cmbd_configuration_manager:10.0</product> <product>universal_cmbd_configuration_manager:10.01</product> <product>universal_cmbd_configuration_manager:10.10</product> <product>universal_cmbd_configuration_manager:10.11</product> <product>universal_cmbd_configuration_manager:10.20</product> <product>universal_cmbd_configuration_manager:10.21</product> <product>universal_cmbd_foundation:10.0</product> <product>universal_cmbd_foundation:10.01</product> <product>universal_cmbd_foundation:10.10</product> <product>universal_cmbd_foundation:10.11</product> <product>universal_cmbd_foundation:10.20</product> <product>universal_cmbd_foundation:10.21</product> <product>universal_discovery:10.0</product> <product>universal_discovery:10.01</product> <product>universal_discovery:10.10</product> <product>universal_discovery:10.11</product> <product>universal_discovery:10.20</product> <product>universal_discovery:10.21</product> </cve> <cve id="CVE-2016-4587" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-1429" level="LOW"> <product>rv180_vpn_router_firmware</product> <product>rv180w_wireless-n_multifunction_vpn_router_firmware</product> </cve> <cve id="CVE-2016-4586" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-1427" level="LOW"> <product>prime_network_registrar:8.2.0</product> <product>prime_network_registrar:8.2.0.1</product> <product>prime_network_registrar:8.2.0.2</product> <product>prime_network_registrar:8.2.1</product> <product>prime_network_registrar:8.2.1.1</product> <product>prime_network_registrar:8.2.2</product> <product>prime_network_registrar:8.2.2.1</product> <product>prime_network_registrar:8.2.3</product> <product>prime_network_registrar:8.3.0</product> <product>prime_network_registrar:8.3.1</product> </cve> <cve id="CVE-2016-1423" level="MEDIUM"> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> </cve> <cve id="CVE-2016-4585" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-1421" level="LOW"> <product>ip_phone_8800_series_firmware:11.0%281%29</product> </cve> <cve id="CVE-2016-1420" level="LOW"> <product>application_infrastructure_controller:-</product> <product>application_policy_infrastructure_controller_firmware:1.0%281e%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%281h%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%281k%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%281n%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%282j%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%282m%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%283f%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%283i%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%283k%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%283n%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%284h%29</product> <product>application_policy_infrastructure_controller_firmware:1.0%284o%29</product> <product>application_policy_infrastructure_controller_firmware:1.1%280.920a%29</product> <product>application_policy_infrastructure_controller_firmware:1.1%281j%29</product> <product>application_policy_infrastructure_controller_firmware:1.1%283f%29</product> </cve> <cve id="CVE-2016-4584" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-4583" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-5898" level="LOW"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-5899" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-5892" level="MEDIUM"> <product>b2b_advanced_communications:1.0.0.5_1</product> <product>multi-enterprise_integration_gateway:1.0.0</product> <product>multi-enterprise_integration_gateway:1.0.0.1</product> </cve> <cve id="CVE-2016-5893" level="LOW"> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-5890" level="MEDIUM"> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-5896" level="LOW"> <product>maximo_asset_management:7.6</product> <product>maximo_for_aviation:7.6</product> <product>maximo_for_life_sciences:7.6</product> <product>maximo_for_nuclear_power:7.6</product> <product>maximo_for_oil_and_gas:7.6</product> <product>maximo_for_transportation:7.6</product> </cve> <cve id="CVE-2016-5897" level="MEDIUM"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-5894" level="MEDIUM"> <product>websphere_commerce:7.0</product> <product>websphere_commerce:7.0.0.1</product> <product>websphere_commerce:7.0.0.2</product> <product>websphere_commerce:7.0.0.3</product> <product>websphere_commerce:7.0.0.4</product> <product>websphere_commerce:7.0.0.5</product> <product>websphere_commerce:7.0.0.6</product> <product>websphere_commerce:7.0.0.7</product> <product>websphere_commerce:7.0.0.8</product> <product>websphere_commerce:7.0.0.9</product> <product>websphere_commerce:8.0</product> <product>websphere_commerce:8.0.0.1</product> <product>websphere_commerce:8.0.0.2</product> <product>websphere_commerce:8.0.0.3</product> <product>websphere_commerce:8.0.0.4</product> <product>websphere_commerce:8.0.0.5</product> <product>websphere_commerce:8.0.0.6</product> <product>websphere_commerce:8.0.0.7</product> <product>websphere_commerce:8.0.0.8</product> <product>websphere_commerce:8.0.0.9</product> <product>websphere_commerce:8.0.0.10</product> <product>websphere_commerce:8.0.0.11</product> <product>websphere_commerce:8.0.0.12</product> <product>websphere_commerce:8.0.0.13</product> <product>websphere_commerce:8.0.0.14</product> <product>websphere_commerce:8.0.0.15</product> <product>websphere_commerce:8.0.0.16</product> <product>websphere_commerce:8.0.0.17</product> <product>websphere_commerce:8.0.0.18</product> <product>websphere_commerce:8.0.0.19</product> <product>websphere_commerce:8.0.1.0</product> <product>websphere_commerce:8.0.1.1</product> <product>websphere_commerce:8.0.1.2</product> <product>websphere_commerce:8.0.1.3</product> <product>websphere_commerce:8.0.1.4</product> <product>websphere_commerce:8.0.1.5</product> <product>websphere_commerce:8.0.1.6</product> <product>websphere_commerce:8.0.1.7</product> <product>websphere_commerce:8.0.1.8</product> <product>websphere_commerce:8.0.1.9</product> <product>websphere_commerce:8.0.1.11</product> <product>websphere_commerce:8.0.1.12</product> </cve> <cve id="CVE-2016-4589" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-4588" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-5092" level="LOW"> <product>fortiweb:5.5.2</product> </cve> <cve id="CVE-2016-5091" level="MEDIUM"> <product>typo3:6.2.23</product> <product>typo3:7.0.0</product> <product>typo3:7.0.2</product> <product>typo3:7.1.0</product> <product>typo3:7.2.0</product> <product>typo3:7.3.0</product> <product>typo3:7.3.1</product> <product>typo3:7.4.0</product> <product>typo3:7.5.0</product> <product>typo3:7.6.0</product> <product>typo3:7.6.1</product> <product>typo3:7.6.2</product> <product>typo3:7.6.3</product> <product>typo3:7.6.4</product> <product>typo3:7.6.5</product> <product>typo3:7.6.6</product> <product>typo3:7.6.7</product> <product>typo3:7.6.8</product> <product>typo3:8.1.1</product> </cve> <cve id="CVE-2016-5097" level="LOW"> <product>phpmyadmin:4.6.1</product> <product>opensuse:13.1</product> </cve> <cve id="CVE-2016-5098" level="LOW"> <product>phpmyadmin:4.6.2</product> <product>opensuse:13.1</product> </cve> <cve id="CVE-2016-5099" level="MEDIUM"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>opensuse:13.1</product> </cve> <cve id="CVE-2016-5548" level="MEDIUM"> <product>jdk:1.6</product> <product>jdk:1.7</product> <product>jdk:1.8</product> <product>jdk:1.8</product> <product>jre:1.6</product> <product>jre:1.7</product> <product>jre:1.8</product> <product>jre:1.8</product> </cve> <cve id="CVE-2016-5549" level="MEDIUM"> <product>jdk:1.7</product> <product>jdk:1.8</product> <product>jdk:1.8</product> <product>jre:1.7</product> <product>jre:1.8</product> <product>jre:1.8</product> </cve> <cve id="CVE-2016-5239" level="LOW"> <product>imagemagick:6.9.3-9</product> </cve> <cve id="CVE-2016-5540" level="MEDIUM"> <product>micros_xstore_payment:1.0</product> </cve> <cve id="CVE-2016-5237" level="MEDIUM"> <product>steamos:3.42.16.13</product> </cve> <cve id="CVE-2016-5542" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5543" level="MEDIUM"> <product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product> <product>flexcube_enterprise_limits_and_collateral_management:12.1.0</product> </cve> <cve id="CVE-2016-5232" level="MEDIUM"> <product>mate_8_firmware:nxt</product> </cve> <cve id="CVE-2016-5545" level="MEDIUM"> <product>vm_virtualbox:5.0.30</product> <product>vm_virtualbox:5.1.12</product> </cve> <cve id="CVE-2016-5230" level="MEDIUM"> <product>mate_8_firmware:nxt</product> </cve> <cve id="CVE-2016-5231" level="LOW"> <product>mate_8_firmware:nxt</product> </cve> <cve id="CVE-2016-3676" level="LOW"> <product>e3276s_firmware:e3276s-150tcpu-v200r002b250d04sp00c00</product> </cve> <cve id="CVE-2016-3677" level="MEDIUM"> <product>hilink_app:-</product> <product>wear_app:-</product> </cve> <cve id="CVE-2016-2019" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2018" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2013" level="LOW"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-2012" level="LOW"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-2011" level="MEDIUM"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-2010" level="MEDIUM"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-2017" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2016" level="LOW"> <product>base-vxfs-50:b.05.00.01</product> <product>base-vxfs-50:b.05.00.02</product> <product>base-vxfs-501:b.05.01.0</product> <product>base-vxfs-501:b.05.01.01</product> <product>base-vxfs-501:b.05.01.03</product> <product>base-vxfs-51:b.05.10.00</product> <product>base-vxfs-51:b.05.10.02</product> </cve> <cve id="CVE-2016-2015" level="LOW"> <product>system_management_homepage:7.5.4.3</product> </cve> <cve id="CVE-2016-2014" level="LOW"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-6848" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6844" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6845" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6847" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6840" level="MEDIUM"> <product>oceanstor_ism:v200r001c01</product> <product>oceanstor_ism:v200r001c02</product> <product>oceanstor_ism:v200r001c03</product> </cve> <cve id="CVE-2016-6842" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6843" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-3658" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3659" level="LOW"> <product>cacti:0.8.8g</product> </cve> <cve id="CVE-2016-6158" level="HIGH"> <product>ws331a_router_firmware:ws331a-10_v100r001c02b017sp01</product> </cve> <cve id="CVE-2016-6159" level="HIGH"> <product>ws331a_router_firmware:ws331a-10_v100r001c02b017sp01</product> </cve> <cve id="CVE-2016-3652" level="MEDIUM"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-3653" level="MEDIUM"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-3650" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-3651" level="MEDIUM"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-3656" level="LOW"> <product>pan-os:5.0.17</product> <product>pan-os:6.0.12</product> <product>pan-os:6.1.9</product> <product>pan-os:7.0.5</product> </cve> <cve id="CVE-2016-3657" level="LOW"> <product>pan-os:5.0.17</product> <product>pan-os:6.0.12</product> <product>pan-os:6.1.9</product> <product>pan-os:7.0.4</product> </cve> <cve id="CVE-2016-3654" level="LOW"> <product>pan-os:5.0.17</product> <product>pan-os:5.1.10</product> <product>pan-os:6.0.12</product> <product>pan-os:6.1.9</product> <product>pan-os:7.0.5</product> </cve> <cve id="CVE-2016-3655" level="LOW"> <product>pan-os:5.0.17</product> <product>pan-os:6.0.12</product> <product>pan-os:6.1.9</product> <product>pan-os:7.0.4</product> </cve> <cve id="CVE-2016-7794" level="LOW"> <product>git-hub:0.10.2</product> </cve> <cve id="CVE-2016-7793" level="MEDIUM"> <product>git-hub:0.10.2</product> </cve> <cve id="CVE-2016-7792" level="LOW"> <product>unifi_ap_ac_lite_firmware:5.2.7</product> </cve> <cve id="CVE-2016-7791" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7790" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7799" level="MEDIUM"> <product>imagemagick:7.0.3-1</product> </cve> <cve id="CVE-2016-7798" level="LOW"> <product>openssl:2.3.1</product> </cve> <cve id="CVE-2016-7908" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-0305" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-0304" level="MEDIUM"> <product>domino:8.5.0</product> <product>domino:8.5.1</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0</product> <product>domino:9.0.1</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> </cve> <cve id="CVE-2016-0307" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-0306" level="MEDIUM"> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-0301" level="MEDIUM"> <product>domino:8.5.0</product> <product>domino:8.5.1</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.2</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.3</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:9.0.0</product> <product>domino:9.0.1</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> </cve> <cve id="CVE-2016-5533" level="LOW"> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.0</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.0</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> <product>primavera_p6_enterprise_project_portfolio_management:16.2</product> </cve> <cve id="CVE-2016-0303" level="MEDIUM"> <product>tivoli_integrated_portal:2.2.0.0</product> <product>tivoli_integrated_portal:2.2.0.1</product> <product>tivoli_integrated_portal:2.2.0.3</product> <product>tivoli_integrated_portal:2.2.0.5</product> <product>tivoli_integrated_portal:2.2.0.7</product> <product>tivoli_integrated_portal:2.2.0.9</product> <product>tivoli_integrated_portal:2.2.0.11</product> <product>tivoli_integrated_portal:2.2.0.13</product> <product>tivoli_integrated_portal:2.2.0.15</product> </cve> <cve id="CVE-2016-0308" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-9427" level="LOW"> <product>bdwgc:7.4.4</product> </cve> <cve id="CVE-2016-9426" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9425" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9424" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9423" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9422" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9421" level="MEDIUM"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9420" level="LOW"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9938" level="LOW"> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.1</product> <product>asterisk:11.0.2</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.1</product> <product>asterisk:11.1.2</product> <product>asterisk:11.2.0</product> <product>asterisk:11.2.0</product> <product>asterisk:11.2.0</product> <product>asterisk:11.2.1</product> <product>asterisk:11.2.2</product> <product>asterisk:11.3.0</product> <product>asterisk:11.4.0</product> <product>asterisk:11.5.0</product> <product>asterisk:11.5.1</product> <product>asterisk:11.6.0</product> <product>asterisk:11.6.1</product> <product>asterisk:11.7.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.1</product> <product>asterisk:11.9.0</product> <product>asterisk:11.10.0</product> <product>asterisk:11.10.1</product> <product>asterisk:11.10.2</product> <product>asterisk:11.11.0</product> <product>asterisk:11.12.0</product> <product>asterisk:11.12.1</product> <product>asterisk:11.13.0</product> <product>asterisk:11.13.1</product> <product>asterisk:11.14.0</product> <product>asterisk:11.14.1</product> <product>asterisk:11.14.2</product> <product>asterisk:11.15.0</product> <product>asterisk:11.15.1</product> <product>asterisk:11.16.0</product> <product>asterisk:11.17.0</product> <product>asterisk:11.17.1</product> <product>asterisk:11.18.0</product> <product>asterisk:11.19.0</product> <product>asterisk:11.20.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.1</product> <product>asterisk:11.21.2</product> <product>asterisk:11.22.0</product> <product>asterisk:11.22.0</product> <product>asterisk:11.23.0</product> <product>asterisk:11.23.0</product> <product>asterisk:11.23.1</product> <product>asterisk:11.24.0</product> <product>asterisk:11.24.1</product> <product>asterisk:11.25.0</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.1</product> <product>asterisk:13.0.2</product> <product>asterisk:13.1.0</product> <product>asterisk:13.1.1</product> <product>asterisk:13.2.0</product> <product>asterisk:13.2.1</product> <product>asterisk:13.3.0</product> <product>asterisk:13.3.1</product> <product>asterisk:13.3.2</product> <product>asterisk:13.4.0</product> <product>asterisk:13.5.0</product> <product>asterisk:13.6.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.1</product> <product>asterisk:13.7.2</product> <product>asterisk:13.8.0</product> <product>asterisk:13.8.0</product> <product>asterisk:13.8.1</product> <product>asterisk:13.8.2</product> <product>asterisk:13.9.0</product> <product>asterisk:13.9.1</product> <product>asterisk:13.10.0</product> <product>asterisk:13.10.0</product> <product>asterisk:13.11.0</product> <product>asterisk:13.11.1</product> <product>asterisk:13.11.2</product> <product>asterisk:13.12.0</product> <product>asterisk:13.12.1</product> <product>asterisk:13.12.2</product> <product>asterisk:13.13.0</product> <product>asterisk:14.0.0</product> <product>asterisk:14.0.0</product> <product>asterisk:14.0.0</product> <product>asterisk:14.0.0</product> <product>asterisk:14.0.0</product> <product>asterisk:14.0.1</product> <product>asterisk:14.0.2</product> <product>asterisk:14.1.0</product> <product>asterisk:14.1.1</product> <product>asterisk:14.1.2</product> <product>asterisk:14.2.0</product> <product>certified_asterisk:11.0.0</product> <product>certified_asterisk:11.0.0</product> <product>certified_asterisk:11.0.0</product> <product>certified_asterisk:11.1.0</product> <product>certified_asterisk:11.1.0</product> <product>certified_asterisk:11.1.0</product> <product>certified_asterisk:11.1.0</product> <product>certified_asterisk:11.2.0</product> <product>certified_asterisk:11.2.0</product> <product>certified_asterisk:11.2.0</product> <product>certified_asterisk:11.3.0</product> <product>certified_asterisk:11.3.0</product> <product>certified_asterisk:11.3.0</product> <product>certified_asterisk:11.4.0</product> <product>certified_asterisk:11.4.0</product> <product>certified_asterisk:11.4.0</product> <product>certified_asterisk:11.4.0</product> <product>certified_asterisk:11.5.0</product> <product>certified_asterisk:11.5.0</product> <product>certified_asterisk:11.5.0</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> </cve> <cve id="CVE-2016-9429" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9428" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-10266" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10267" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10268" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10269" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-8334" level="MEDIUM"> <product>reader:8.0.2.805</product> </cve> <cve id="CVE-2016-8335" level="MEDIUM"> <product>argus:6.6.04</product> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-5933" level="MEDIUM"> <product>tivoli_monitoring:6.2.2</product> <product>tivoli_monitoring:6.2.2.2</product> <product>tivoli_monitoring:6.2.2.3</product> <product>tivoli_monitoring:6.2.2.4</product> <product>tivoli_monitoring:6.2.2.5</product> <product>tivoli_monitoring:6.2.2.6</product> <product>tivoli_monitoring:6.2.2.7</product> <product>tivoli_monitoring:6.2.2.8</product> <product>tivoli_monitoring:6.2.2.9</product> <product>tivoli_monitoring:6.2.3</product> <product>tivoli_monitoring:6.2.3.1</product> <product>tivoli_monitoring:6.2.3.2</product> <product>tivoli_monitoring:6.2.3.3</product> <product>tivoli_monitoring:6.2.3.4</product> <product>tivoli_monitoring:6.2.3.5</product> <product>tivoli_monitoring:6.3.0</product> <product>tivoli_monitoring:6.3.0.1</product> <product>tivoli_monitoring:6.3.0.2</product> <product>tivoli_monitoring:6.3.0.3</product> <product>tivoli_monitoring:6.3.0.4</product> <product>tivoli_monitoring:6.3.0.5</product> <product>tivoli_monitoring:6.3.0.6</product> <product>tivoli_monitoring:6.3.0.7</product> </cve> <cve id="CVE-2016-5932" level="MEDIUM"> <product>connections:4.0</product> <product>connections:4.5</product> <product>connections:5.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-5935" level="MEDIUM"> <product>dashboard_application_services_hub:3.1.3</product> </cve> <cve id="CVE-2016-5934" level="MEDIUM"> <product>tivoli_storage_manager_fastback:</product> </cve> <cve id="CVE-2016-5937" level="MEDIUM"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-8333" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-5939" level="LOW"> <product>kenexa_lms_on_cloud:4.1</product> <product>kenexa_lms_on_cloud:4.2</product> <product>kenexa_lms_on_cloud:4.2.2</product> <product>kenexa_lms_on_cloud:4.2.3</product> <product>kenexa_lms_on_cloud:4.2.4</product> <product>kenexa_lms_on_cloud:5.0</product> <product>kenexa_lms_on_cloud:5.1</product> <product>kenexa_lms_on_cloud:5.2</product> </cve> <cve id="CVE-2016-5938" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8339" level="LOW"> <product>redis:3.2.0</product> <product>redis:3.2.1</product> <product>redis:3.2.2</product> <product>redis:3.2.3</product> </cve> <cve id="CVE-2016-9683" level="LOW"> <product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product> </cve> <cve id="CVE-2016-9682" level="LOW"> <product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product> </cve> <cve id="CVE-2016-9681" level="MEDIUM"> <product>serendipity:2.0.4</product> </cve> <cve id="CVE-2016-9680" level="LOW"> <product>provisioning_services:7.0</product> <product>provisioning_services:7.1</product> <product>provisioning_services:7.6</product> <product>provisioning_services:7.7</product> <product>provisioning_services:7.8</product> <product>provisioning_services:7.9</product> <product>provisioning_services:7.11</product> </cve> <cve id="CVE-2016-9686" level="LOW"> <product>puppet_enterprise:2015.3.3</product> <product>puppet_enterprise:2016.4.2</product> <product>puppet_enterprise:2016.5.1</product> </cve> <cve id="CVE-2016-9684" level="LOW"> <product>sonicwall_secure_remote_access_server:8.1.0.2-14sv</product> </cve> <cve id="CVE-2016-10402" level="MEDIUM"> <product>antivirus:8.3.36.59</product> </cve> <cve id="CVE-2016-10400" level="LOW"> <product>atutor:2.2.1</product> </cve> <cve id="CVE-2016-10401" level="LOW"> <product>pk5001z_firmware:-</product> </cve> <cve id="CVE-2016-10406" level="LOW"> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10407" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10404" level="MEDIUM"> <product>liferay_portal:7.0</product> </cve> <cve id="CVE-2016-10405" level="LOW"> <product>dir-600l_firmware:1.16</product> </cve> <cve id="CVE-2016-10409" level="MEDIUM"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-4551" level="LOW"> <product>netweaver:2004s</product> <product>sap_aba:7.00</product> <product>sap_basis:7.00</product> </cve> <cve id="CVE-2016-4552" level="MEDIUM"> <product>webmail:1.2</product> </cve> <cve id="CVE-2016-2224" level="LOW"> <product>uclibc-ng:1.0.11</product> </cve> <cve id="CVE-2016-2225" level="LOW"> <product>uclibc-ng:1.0.11</product> </cve> <cve id="CVE-2016-2226" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-6795" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.2</product> <product>struts:2.3.20.3</product> <product>struts:2.3.21</product> <product>struts:2.3.22</product> <product>struts:2.3.23</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.2</product> <product>struts:2.3.24.3</product> <product>struts:2.3.25</product> <product>struts:2.3.26</product> <product>struts:2.3.27</product> <product>struts:2.3.28</product> <product>struts:2.3.28.1</product> <product>struts:2.3.29</product> <product>struts:2.3.30</product> </cve> <cve id="CVE-2016-0888" level="LOW"> <product>documentum_d2:4.5</product> </cve> <cve id="CVE-2016-0889" level="LOW"> <product>unisphere:8.1</product> </cve> <cve id="CVE-2016-0886" level="LOW"> <product>documentum_xcp:2.1</product> <product>documentum_xcp:2.2</product> </cve> <cve id="CVE-2016-0887" level="HIGH"> <product>rsa_bsafe:4.0.8</product> <product>rsa_bsafe:4.1.4</product> <product>rsa_bsafe_crypto-c:4.0.4</product> <product>rsa_bsafe_crypto-c:4.1.2</product> <product>rsa_bsafe_crypto-j:6.2.0.1</product> <product>rsa_bsafe_ssl-c:2.8.8</product> <product>rsa_bsafe_ssl-j:6.2</product> </cve> <cve id="CVE-2016-0882" level="LOW"> <product>documentum_xcp:2.1</product> <product>documentum_xcp:2.2</product> </cve> <cve id="CVE-2016-0883" level="LOW"> <product>operations_manager:1.5.13</product> <product>operations_manager:1.6.0</product> <product>operations_manager:1.6.1</product> <product>operations_manager:1.6.2</product> <product>operations_manager:1.6.3</product> <product>operations_manager:1.6.4</product> <product>operations_manager:1.6.5</product> <product>operations_manager:1.6.6</product> <product>operations_manager:1.6.7</product> <product>operations_manager:1.6.8</product> </cve> <cve id="CVE-2016-0881" level="LOW"> <product>documentum_xcp:2.1</product> <product>documentum_xcp:2.2</product> </cve> <cve id="CVE-2016-6303" level="LOW"> <product>node.js:6.6.0</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.1s</product> <product>openssl:1.0.1t</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>openssl:1.0.2g</product> <product>openssl:1.0.2h</product> </cve> <cve id="CVE-2016-6301" level="LOW"> <product>busybox:1.5.2</product> <product>busybox:1.6.2</product> <product>busybox:1.7.4</product> <product>busybox:1.7.5</product> <product>busybox:1.8.3</product> <product>busybox:1.19.1</product> <product>busybox:1.21.0</product> <product>busybox:1.21.1</product> <product>busybox:1.22.0</product> <product>busybox:1.22.1</product> <product>busybox:1.23.0</product> <product>busybox:1.23.1</product> <product>busybox:1.23.2</product> <product>busybox:1.24.0</product> <product>busybox:1.24.1</product> <product>busybox:1.24.2</product> <product>busybox:1.25.0</product> </cve> <cve id="CVE-2016-6307" level="MEDIUM"> <product>openssl:1.1.0</product> </cve> <cve id="CVE-2016-6306" level="MEDIUM"> <product>icewall_federation_agent:3.0</product> <product>icewall_mcrp:3.0</product> <product>icewall_sso:10.0</product> <product>icewall_sso:10.0</product> <product>icewall_sso_agent_option:10.0</product> <product>node.js:6.6.0</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.1s</product> <product>openssl:1.0.1t</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>openssl:1.0.2h</product> <product>suse_linux_enterprise_module_for_web_scripting:12.0</product> </cve> <cve id="CVE-2016-6305" level="LOW"> <product>openssl:1.1.0</product> </cve> <cve id="CVE-2016-6304" level="LOW"> <product>node.js:6.6.0</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.1s</product> <product>openssl:1.0.1t</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>openssl:1.0.2h</product> <product>openssl:1.1.0</product> <product>suse_linux_enterprise_module_for_web_scripting:12.0</product> </cve> <cve id="CVE-2016-6309" level="LOW"> <product>openssl:1.1.0a</product> </cve> <cve id="CVE-2016-6308" level="MEDIUM"> <product>openssl:1.1.0</product> </cve> <cve id="CVE-2016-4314" level="LOW"> <product>carbon:4.4.5</product> </cve> <cve id="CVE-2016-0327" level="LOW"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> </cve> <cve id="CVE-2016-0326" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> </cve> <cve id="CVE-2016-6435" level="LOW"> <product>firepower_management_center:6.0.1</product> </cve> <cve id="CVE-2016-6434" level="LOW"> <product>firepower_management_center:6.0.1</product> </cve> <cve id="CVE-2016-6437" level="MEDIUM"> <product>wide_area_application_services:5.3.1</product> <product>wide_area_application_services:5.3.3</product> <product>wide_area_application_services:5.3.5</product> <product>wide_area_application_services:5.3.5a</product> <product>wide_area_application_services:5.3.5b</product> <product>wide_area_application_services:5.3.5c</product> <product>wide_area_application_services:5.3.5d</product> <product>wide_area_application_services:5.3.5e</product> <product>wide_area_application_services:5.3.5f</product> <product>wide_area_application_services:6.1.0</product> <product>wide_area_application_services:6.1.1</product> <product>wide_area_application_services:6.2.1</product> <product>wide_area_application_services:6.2.1a</product> </cve> <cve id="CVE-2016-10679" level="MEDIUM"> <product>selenium-standalone-painful:2.39.0-2.7.0</product> </cve> <cve id="CVE-2016-10678" level="MEDIUM"> <product>serc.js:0.0.1</product> </cve> <cve id="CVE-2016-6436" level="MEDIUM"> <product>hostscan_engine:3.0.08062</product> <product>hostscan_engine:3.0.08066</product> <product>hostscan_engine:3.1.01065</product> <product>hostscan_engine:3.1.02016</product> <product>hostscan_engine:3.1.02026</product> <product>hostscan_engine:3.1.02040</product> <product>hostscan_engine:3.1.02043</product> <product>hostscan_engine:3.1.03103</product> <product>hostscan_engine:3.1.03104</product> <product>hostscan_engine:3.1.04060</product> <product>hostscan_engine:3.1.04063</product> <product>hostscan_engine:3.1.04075</product> <product>hostscan_engine:3.1.04082</product> <product>hostscan_engine:3.1.05152</product> <product>hostscan_engine:3.1.05160</product> <product>hostscan_engine:3.1.05163</product> <product>hostscan_engine:3.1.05170</product> <product>hostscan_engine:3.1.05178</product> <product>hostscan_engine:3.1.05182</product> <product>hostscan_engine:3.1.05183</product> <product>hostscan_engine:3.1.06073</product> <product>hostscan_engine:3.1.14018</product> </cve> <cve id="CVE-2016-10671" level="MEDIUM"> <product>mystem-wrapper:0.2.0</product> </cve> <cve id="CVE-2016-6431" level="MEDIUM"> <product>adaptive_security_appliance_software:8.0.2.11</product> <product>adaptive_security_appliance_software:8.0.2.15</product> <product>adaptive_security_appliance_software:8.0.3</product> <product>adaptive_security_appliance_software:8.0.3.6</product> <product>adaptive_security_appliance_software:8.0.3.12</product> <product>adaptive_security_appliance_software:8.0.3.19</product> <product>adaptive_security_appliance_software:8.0.4</product> <product>adaptive_security_appliance_software:8.0.4.3</product> <product>adaptive_security_appliance_software:8.0.4.9</product> <product>adaptive_security_appliance_software:8.0.4.16</product> <product>adaptive_security_appliance_software:8.0.4.23</product> <product>adaptive_security_appliance_software:8.0.4.25</product> <product>adaptive_security_appliance_software:8.0.4.28</product> <product>adaptive_security_appliance_software:8.0.4.31</product> <product>adaptive_security_appliance_software:8.0.4.32</product> <product>adaptive_security_appliance_software:8.0.4.33</product> <product>adaptive_security_appliance_software:8.0.5</product> <product>adaptive_security_appliance_software:8.0.5.20</product> <product>adaptive_security_appliance_software:8.0.5.23</product> <product>adaptive_security_appliance_software:8.0.5.25</product> <product>adaptive_security_appliance_software:8.0.5.27</product> <product>adaptive_security_appliance_software:8.0.5.28</product> <product>adaptive_security_appliance_software:8.0.5.31</product> <product>adaptive_security_appliance_software:8.1.0.104</product> <product>adaptive_security_appliance_software:8.1.1</product> <product>adaptive_security_appliance_software:8.1.1.6</product> <product>adaptive_security_appliance_software:8.1.2</product> <product>adaptive_security_appliance_software:8.1.2.13</product> <product>adaptive_security_appliance_software:8.1.2.15</product> <product>adaptive_security_appliance_software:8.1.2.16</product> <product>adaptive_security_appliance_software:8.1.2.19</product> <product>adaptive_security_appliance_software:8.1.2.23</product> <product>adaptive_security_appliance_software:8.1.2.24</product> <product>adaptive_security_appliance_software:8.1.2.49</product> <product>adaptive_security_appliance_software:8.1.2.50</product> <product>adaptive_security_appliance_software:8.1.2.55</product> <product>adaptive_security_appliance_software:8.1.2.56</product> <product>adaptive_security_appliance_software:8.2.0.45</product> <product>adaptive_security_appliance_software:8.2.1</product> <product>adaptive_security_appliance_software:8.2.1.11</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.2.9</product> <product>adaptive_security_appliance_software:8.2.2.10</product> <product>adaptive_security_appliance_software:8.2.2.12</product> <product>adaptive_security_appliance_software:8.2.2.16</product> <product>adaptive_security_appliance_software:8.2.2.17</product> <product>adaptive_security_appliance_software:8.2.3</product> <product>adaptive_security_appliance_software:8.2.4</product> <product>adaptive_security_appliance_software:8.2.4.1</product> <product>adaptive_security_appliance_software:8.2.4.4</product> <product>adaptive_security_appliance_software:8.2.5</product> <product>adaptive_security_appliance_software:8.2.5.13</product> <product>adaptive_security_appliance_software:8.2.5.22</product> <product>adaptive_security_appliance_software:8.2.5.26</product> <product>adaptive_security_appliance_software:8.2.5.33</product> <product>adaptive_security_appliance_software:8.2.5.40</product> <product>adaptive_security_appliance_software:8.2.5.41</product> <product>adaptive_security_appliance_software:8.2.5.46</product> <product>adaptive_security_appliance_software:8.2.5.48</product> <product>adaptive_security_appliance_software:8.2.5.50</product> <product>adaptive_security_appliance_software:8.2.5.52</product> <product>adaptive_security_appliance_software:8.2.5.55</product> <product>adaptive_security_appliance_software:8.2.5.57</product> <product>adaptive_security_appliance_software:8.2.5.59</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.1.1</product> <product>adaptive_security_appliance_software:8.3.1.4</product> <product>adaptive_security_appliance_software:8.3.1.6</product> <product>adaptive_security_appliance_software:8.3.2</product> <product>adaptive_security_appliance_software:8.3.2.4</product> <product>adaptive_security_appliance_software:8.3.2.13</product> <product>adaptive_security_appliance_software:8.3.2.23</product> <product>adaptive_security_appliance_software:8.3.2.25</product> <product>adaptive_security_appliance_software:8.3.2.31</product> <product>adaptive_security_appliance_software:8.3.2.33</product> <product>adaptive_security_appliance_software:8.3.2.34</product> <product>adaptive_security_appliance_software:8.3.2.37</product> <product>adaptive_security_appliance_software:8.3.2.39</product> <product>adaptive_security_appliance_software:8.3.2.40</product> <product>adaptive_security_appliance_software:8.3.2.41</product> <product>adaptive_security_appliance_software:8.3.2.44</product> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.6.1</product> <product>adaptive_security_appliance_software:8.6.1.1</product> <product>adaptive_security_appliance_software:8.6.1.2</product> <product>adaptive_security_appliance_software:8.6.1.5</product> <product>adaptive_security_appliance_software:8.6.1.10</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:8.6.1.13</product> <product>adaptive_security_appliance_software:8.6.1.14</product> <product>adaptive_security_appliance_software:8.6.1.17</product> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.0.4.40</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.1.7.4</product> <product>adaptive_security_appliance_software:9.1.7.6</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.2.4.8</product> <product>adaptive_security_appliance_software:9.2.4.10</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.3.9</product> <product>adaptive_security_appliance_software:9.3.3.10</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.4.3</product> <product>adaptive_security_appliance_software:9.4.3.3</product> <product>adaptive_security_appliance_software:9.4.3.4</product> <product>adaptive_security_appliance_software:9.5.1</product> <product>adaptive_security_appliance_software:9.5.2</product> <product>adaptive_security_appliance_software:9.5.2.6</product> <product>adaptive_security_appliance_software:9.5.2.10</product> <product>adaptive_security_appliance_software:9.5.2.14</product> <product>adaptive_security_appliance_software:9.6.0</product> <product>adaptive_security_appliance_software:9.6.1</product> <product>adaptive_security_appliance_software:9.6.1.3</product> </cve> <cve id="CVE-2016-10673" level="MEDIUM"> <product>ipip-coffee:1.0.9</product> </cve> <cve id="CVE-2016-10672" level="MEDIUM"> <product>cloudpub-redis:2.4.5</product> </cve> <cve id="CVE-2016-10675" level="MEDIUM"> <product>libsbmlsim:0.0.2</product> </cve> <cve id="CVE-2016-10677" level="MEDIUM"> <product>google-closure-tools-latest:0.1.1</product> </cve> <cve id="CVE-2016-3150" level="MEDIUM"> <product>clickshare_csc-1_firmware:01.09.05.02</product> <product>clickshare_cse-200_firmware:01.09.02.05</product> </cve> <cve id="CVE-2016-6433" level="LOW"> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.2_base</product> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.0.2</product> <product>firepower_management_center:5.3.0.3</product> <product>firepower_management_center:5.3.0.4</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.3.1.3</product> <product>firepower_management_center:5.3.1.4</product> <product>firepower_management_center:5.3.1.5</product> <product>firepower_management_center:5.3.1.6</product> <product>firepower_management_center:5.4.0</product> <product>firepower_management_center:5.4.0.2</product> <product>firepower_management_center:5.4.1</product> <product>firepower_management_center:5.4.1.1</product> <product>firepower_management_center:5.4.1.2</product> <product>firepower_management_center:5.4.1.3</product> <product>firepower_management_center:5.4.1.4</product> <product>firepower_management_center:5.4.1.5</product> <product>firepower_management_center:5.4.1.6</product> <product>firepower_management_center:5.4_base</product> <product>firepower_management_center:6.0.1</product> </cve> <cve id="CVE-2016-6432" level="MEDIUM"> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.5.1</product> <product>adaptive_security_appliance_software:8.5.1.1</product> <product>adaptive_security_appliance_software:8.5.1.6</product> <product>adaptive_security_appliance_software:8.5.1.7</product> <product>adaptive_security_appliance_software:8.5.1.14</product> <product>adaptive_security_appliance_software:8.5.1.17</product> <product>adaptive_security_appliance_software:8.5.1.18</product> <product>adaptive_security_appliance_software:8.5.1.19</product> <product>adaptive_security_appliance_software:8.5.1.21</product> <product>adaptive_security_appliance_software:8.5.1.24</product> <product>adaptive_security_appliance_software:8.6.1</product> <product>adaptive_security_appliance_software:8.6.1.1</product> <product>adaptive_security_appliance_software:8.6.1.2</product> <product>adaptive_security_appliance_software:8.6.1.5</product> <product>adaptive_security_appliance_software:8.6.1.10</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:8.6.1.13</product> <product>adaptive_security_appliance_software:8.6.1.14</product> <product>adaptive_security_appliance_software:8.6.1.17</product> <product>adaptive_security_appliance_software:8.7.1</product> <product>adaptive_security_appliance_software:8.7.1.1</product> <product>adaptive_security_appliance_software:8.7.1.3</product> <product>adaptive_security_appliance_software:8.7.1.4</product> <product>adaptive_security_appliance_software:8.7.1.7</product> <product>adaptive_security_appliance_software:8.7.1.8</product> <product>adaptive_security_appliance_software:8.7.1.11</product> <product>adaptive_security_appliance_software:8.7.1.13</product> <product>adaptive_security_appliance_software:8.7.1.16</product> <product>adaptive_security_appliance_software:8.7.1.17</product> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.1.7.4</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.5.1</product> <product>adaptive_security_appliance_software:9.5.2</product> <product>adaptive_security_appliance_software:9.6.0</product> <product>adaptive_security_appliance_software:9.6.1</product> </cve> <cve id="CVE-2016-8652" level="MEDIUM"> <product>dovecot:2.2.27</product> </cve> <cve id="CVE-2016-0468" level="MEDIUM"> <product>business_intelligence:11.1.1.7.0</product> <product>business_intelligence:11.1.1.9.0</product> <product>business_intelligence:12.2.1.0.0</product> </cve> <cve id="CVE-2016-8656" level="LOW"> <product>jboss_enterprise_application_platform:5.0.0</product> <product>jboss_enterprise_application_platform:6.0.0</product> <product>jboss_enterprise_application_platform:6.4.0</product> <product>jboss_enterprise_application_platform:7.0.0</product> <product>jboss_enterprise_application_platform:7.1.0</product> </cve> <cve id="CVE-2016-0464" level="MEDIUM"> <product>fusion_middleware:10.3.6</product> <product>fusion_middleware:12.1.2.0</product> <product>fusion_middleware:12.1.3.0</product> </cve> <cve id="CVE-2016-0465" level="LOW"> <product>oracle_and_sun_systems_product_suite:3.3</product> <product>oracle_and_sun_systems_product_suite:4.0</product> </cve> <cve id="CVE-2016-8659" level="MEDIUM"> <product>bubblewrap:0.1.1</product> </cve> <cve id="CVE-2016-7300" level="LOW"> <product>auto_updater_for_mac:-</product> </cve> <cve id="CVE-2016-0462" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> </cve> <cve id="CVE-2016-0463" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-4309" level="HIGH"> <product>symphony_cms:2.6.7</product> </cve> <cve id="CVE-2016-1228" level="MEDIUM"> <product>pr-400mi:-</product> <product>pr-400mi_firmware:07.00.1006</product> <product>rt-400mi_firmware:07.00.1006</product> <product>rv-440mi_firmware:07.00.1006</product> <product>pr-400mi_firmware:07.00.1005</product> <product>rt-400mi_firmware:07.00.1005</product> <product>rv-440mi_firmware:07.00.1005</product> </cve> <cve id="CVE-2016-4301" level="MEDIUM"> <product>libarchive:3.2.0</product> </cve> <cve id="CVE-2016-3159" level="LOW"> <product>fedora:22</product> <product>fedora:23</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> <product>xen:4.3.4</product> <product>xen:4.4.4</product> <product>xen:4.5.3</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-4303" level="LOW"> <product>iperf:3.0.11</product> <product>iperf:3.1.2</product> <product>suse_package_hub_for_suse_linux_enterprise:12</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-1222" level="MEDIUM"> <product>php-contact-form:20151231</product> </cve> <cve id="CVE-2016-4305" level="LOW"> <product>internet_security:16.0.0</product> </cve> <cve id="CVE-2016-4304" level="LOW"> <product>internet_security:16.0.0</product> </cve> <cve id="CVE-2016-4307" level="LOW"> <product>internet_security:16.0.0</product> </cve> <cve id="CVE-2016-4306" level="LOW"> <product>total_security:16.0.0.614</product> </cve> <cve id="CVE-2016-3519" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3515" level="LOW"> <product>enterprise_communications_broker:2.0.041</product> </cve> <cve id="CVE-2016-3514" level="LOW"> <product>enterprise_communications_broker:2.0.041</product> </cve> <cve id="CVE-2016-3517" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3516" level="LOW"> <product>enterprise_communications_broker:2.0.041</product> </cve> <cve id="CVE-2016-3511" level="MEDIUM"> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-3513" level="LOW"> <product>communications_operations_monitor:3.3.92.0.0</product> </cve> <cve id="CVE-2016-3512" level="MEDIUM"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> </cve> <cve id="CVE-2016-0798" level="LOW"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> </cve> <cve id="CVE-2016-0799" level="LOW"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>client:-</product> <product>client:-</product> <product>steel_belted_radius:-</product> </cve> <cve id="CVE-2016-7160" level="LOW"> <product>samsung_mobile:6.0</product> </cve> <cve id="CVE-2016-7161" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-0790" level="LOW"> <product>jenkins:1.642.1</product> <product>jenkins:1.649</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-0791" level="LOW"> <product>jenkins:1.642.1</product> <product>jenkins:1.649</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-7164" level="LOW"> <product>libtorrent:1.1</product> </cve> <cve id="CVE-2016-7165" level="MEDIUM"> <product>primary_setup_tool:-</product> <product>security_configuration_tool:-</product> <product>simatic_it_production_suite:-</product> <product>simatic_net_pc_software:14.0</product> <product>simatic_pcs7:8.0</product> <product>simatic_pcs7:8.1</product> <product>simatic_pcs7:8.2</product> <product>simatic_pcs_7:7.1</product> <product>simatic_step_7:5.5</product> <product>simatic_step_7_%28tia_portal%29:14.0</product> <product>simatic_winac_rtx_2010:-</product> <product>simatic_winac_rtx_f_2010:-</product> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.2</product> <product>simatic_wincc:7.3</product> <product>simatic_wincc:7.4</product> <product>simatic_wincc_%28tia_portal%29:-</product> <product>simatic_wincc_%28tia_portal%29:14.0</product> <product>simatic_wincc_%28tia_portal%29:14.0</product> <product>simatic_wincc_%28tia_portal%29:14.0</product> <product>simatic_wincc_runtime:-</product> <product>simit:9.0</product> <product>sinema_remote_connect:-</product> <product>sinema_server:13.0</product> <product>softnet_security_client:5.0</product> <product>telecontrol_basic:3.0</product> </cve> <cve id="CVE-2016-7167" level="LOW"> <product>libcurl:7.50.2</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-10099" level="LOW"> <product>borg:1.0.8</product> </cve> <cve id="CVE-2016-10098" level="LOW"> <product>avera_sms_gateway_firmware:-</product> <product>entera_sms_gateway_firmware:-</product> </cve> <cve id="CVE-2016-10095" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10094" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10097" level="LOW"> <product>openam:10.1.0</product> </cve> <cve id="CVE-2016-10096" level="LOW"> <product>genixcms:0.0.8</product> </cve> <cve id="CVE-2016-10091" level="LOW"> <product>unrtf:0.21.9</product> </cve> <cve id="CVE-2016-10093" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10092" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-6147" level="LOW"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-9218" level="MEDIUM"> <product>hybrid_meeting_server:1.0_base</product> </cve> <cve id="CVE-2016-9219" level="LOW"> <product>wireless_lan_controller_firmware:8.2.121.0</product> <product>wireless_lan_controller_firmware:8.3.102.0</product> </cve> <cve id="CVE-2016-1000149" level="MEDIUM"> <product>simpel-reserveren:3.5.2</product> </cve> <cve id="CVE-2016-1000148" level="MEDIUM"> <product>s3-video:0.983</product> </cve> <cve id="CVE-2016-9748" level="LOW"> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_requirements_composer:4.0.7</product> </cve> <cve id="CVE-2016-1000145" level="MEDIUM"> <product>pondol-carousel:1.0</product> </cve> <cve id="CVE-2016-9211" level="LOW"> <product>ons_15454_sdh_multiservice_platform_software:10.51.0</product> </cve> <cve id="CVE-2016-9212" level="LOW"> <product>web_security_appliance:9.0.1-162</product> <product>web_security_appliance:9.1.1-074</product> </cve> <cve id="CVE-2016-1000146" level="MEDIUM"> <product>pondol-formmail:1.1</product> </cve> <cve id="CVE-2016-9214" level="MEDIUM"> <product>identity_services_engine_software:2.0%281.130%29</product> </cve> <cve id="CVE-2016-1000140" level="MEDIUM"> <product>new-year-firework:1.1.9</product> </cve> <cve id="CVE-2016-9216" level="LOW"> <product>asr_5000_series_software:20.0.0</product> <product>asr_5000_series_software:20.0.1.0</product> <product>asr_5000_series_software:20.0.1.a0</product> <product>asr_5000_series_software:20.0.1.v0</product> <product>asr_5000_series_software:20.0.m0.62842</product> <product>asr_5000_series_software:20.0.m0.63229</product> <product>asr_5000_series_software:20.0.v0</product> <product>asr_5000_series_software:21.0.0</product> </cve> <cve id="CVE-2016-9217" level="LOW"> <product>intercloud_fabric:2.2.1_base</product> <product>intercloud_fabric:2.3.1_base</product> <product>intercloud_fabric:3.1.1_base</product> </cve> <cve id="CVE-2016-2071" level="LOW"> <product>netscaler:10.5</product> <product>netscaler:10.5e</product> <product>netscaler:11.0</product> </cve> <cve id="CVE-2016-2072" level="MEDIUM"> <product>netscaler:10.1</product> <product>netscaler:10.5</product> <product>netscaler:10.5e</product> <product>netscaler:11.0</product> </cve> <cve id="CVE-2016-2075" level="MEDIUM"> <product>vrealize_business:8.0</product> <product>vrealize_business:8.0.1</product> <product>vrealize_business:8.0.2</product> <product>vrealize_business:8.1</product> <product>vrealize_business:8.2</product> <product>vrealize_business:8.2.1</product> <product>vrealize_business:8.2.2</product> <product>vrealize_business:8.2.3</product> <product>vrealize_business:8.2.4</product> </cve> <cve id="CVE-2016-2074" level="LOW"> <product>openvswitch:2.2.0</product> <product>openvswitch:2.3.0</product> <product>openvswitch:2.3.1</product> <product>openvswitch:2.3.2</product> <product>openvswitch:2.4.0</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-2077" level="LOW"> <product>player:7.0</product> <product>player:7.1</product> <product>player:7.1.1</product> <product>player:7.1.2</product> <product>workstation:11.0</product> <product>workstation:11.1</product> <product>workstation:11.1.1</product> <product>workstation:11.1.2</product> </cve> <cve id="CVE-2016-2076" level="MEDIUM"> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:6.0</product> <product>vcloud_automation_identity_appliance:6.2.4</product> <product>vcloud_director:5.5.5</product> </cve> <cve id="CVE-2016-2079" level="MEDIUM"> <product>nsx_edge:6.1.0</product> <product>nsx_edge:6.1.1</product> <product>nsx_edge:6.1.2</product> <product>nsx_edge:6.1.4</product> <product>nsx_edge:6.1.5</product> <product>nsx_edge:6.1.6</product> <product>nsx_edge:6.2.0</product> <product>nsx_edge:6.2.1</product> <product>nsx_edge:6.2.2</product> <product>vcloud_networking_and_security_edge:5.5.0</product> <product>vcloud_networking_and_security_edge:5.5.2.1</product> <product>vcloud_networking_and_security_edge:5.5.3</product> <product>vcloud_networking_and_security_edge:5.5.3.1</product> <product>vcloud_networking_and_security_edge:5.5.4</product> <product>vcloud_networking_and_security_edge:5.5.4.1</product> <product>vcloud_networking_and_security_edge:5.5.4.2</product> </cve> <cve id="CVE-2016-2078" level="MEDIUM"> <product>vcenter_server:5.0</product> <product>vcenter_server:5.1</product> <product>vcenter_server:5.5</product> <product>vcenter_server:6.0</product> </cve> <cve id="CVE-2016-6798" level="LOW"> <product>sling:1.0.10</product> </cve> <cve id="CVE-2016-6799" level="LOW"> <product>cordova:5.2.2</product> </cve> <cve id="CVE-2016-6829" level="LOW"> <product>barclamp-trove:-</product> <product>crowbar-openstack:-</product> </cve> <cve id="CVE-2016-6823" level="LOW"> <product>imagemagick:7.0.2-9</product> </cve> <cve id="CVE-2016-6820" level="LOW"> <product>metrocluster_tiebreaker:1.1</product> </cve> <cve id="CVE-2016-6793" level="LOW"> <product>wicket:1.5.0</product> <product>wicket:1.5.1</product> <product>wicket:1.5.2</product> <product>wicket:1.5.3</product> <product>wicket:1.5.4</product> <product>wicket:1.5.5</product> <product>wicket:1.5.6</product> <product>wicket:6.0.0</product> <product>wicket:6.1.0</product> <product>wicket:6.2.0</product> <product>wicket:6.3.0</product> <product>wicket:6.4.0</product> <product>wicket:6.5.0</product> <product>wicket:6.6.0</product> <product>wicket:6.7.0</product> <product>wicket:6.8.0</product> <product>wicket:6.9.0</product> <product>wicket:6.10.0</product> <product>wicket:6.11.0</product> <product>wicket:6.12.0</product> <product>wicket:6.13.0</product> <product>wicket:6.14.0</product> <product>wicket:6.15.0</product> <product>wicket:6.16.0</product> <product>wicket:6.17.0</product> <product>wicket:6.18.0</product> <product>wicket:6.19.0</product> <product>wicket:6.20.0</product> <product>wicket:6.21.0</product> <product>wicket:6.22.0</product> <product>wicket:6.23.0</product> <product>wicket:6.24.0</product> </cve> <cve id="CVE-2016-6826" level="MEDIUM"> <product>anyoffice_secureapp:2.5.0301.0190</product> <product>anyoffice_secureapp:2.5.0501.0190</product> </cve> <cve id="CVE-2016-6827" level="LOW"> <product>fusioncompute:v100r003c10</product> </cve> <cve id="CVE-2016-6824" level="LOW"> <product>ac6003_firmware:v200r005c10</product> <product>ac6003_firmware:v200r006c00</product> <product>ac6005_firmware:v200r005c10</product> <product>ac6005_firmware:v200r006c00</product> <product>ac6605_firmware:v200r005c10</product> <product>ac6605_firmware:v200r006c00</product> <product>acu2_firmware:v200r005c10</product> <product>acu2_firmware:v200r006c00</product> </cve> <cve id="CVE-2016-6825" level="LOW"> <product>rh1288_v3_server_firmware:v100r003c00</product> <product>rh2288_v3_server_firmware:v100r003c00</product> <product>rh2288h_v3_server_firmware:v100r003c00</product> <product>xh620_v3_server_firmware:v100r003c00</product> <product>xh622_v3_server_firmware:v100r003c00</product> <product>xh628_v3_server_firmware:v100r003c00</product> </cve> <cve id="CVE-2016-3670" level="MEDIUM"> <product>liferay_portal:6.2</product> </cve> <cve id="CVE-2016-6175" level="LOW"> <product>php-gettext:1.0.12</product> </cve> <cve id="CVE-2016-6177" level="LOW"> <product>oceanstor_5800_v3_firmware:v300r003c00</product> </cve> <cve id="CVE-2016-6170" level="LOW"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> </cve> <cve id="CVE-2016-6171" level="LOW"> <product>knot_dns:2.2.1</product> </cve> <cve id="CVE-2016-6172" level="MEDIUM"> <product>authoritative_server:4.0.0</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-6173" level="LOW"> <product>nsd:4.1.10</product> </cve> <cve id="CVE-2016-3678" level="LOW"> <product>s5300_firmware:v200r003c00spc500</product> <product>s5700_firmware:v200r003c00spc500</product> <product>s7700_firmware:v200r003c00spc500</product> <product>s9300_firmware:v200r003c00spc500</product> <product>s9700_firmware:v200r003c00spc500</product> </cve> <cve id="CVE-2016-6178" level="LOW"> <product>cloudengine_12800_firmware:v100r003c00</product> <product>cloudengine_12800_firmware:v100r003c10</product> <product>cloudengine_12800_firmware:v100r005c00</product> <product>cloudengine_12800_firmware:v100r005c10</product> <product>cx600_firmware:v600r008c20</product> <product>cx600_firmware:v800r006c00</product> <product>cx600_firmware:v800r006c20</product> <product>cx600_firmware:v800r007c00</product> <product>ne40e_firmware:v600r008c20</product> <product>ne40e_firmware:v800r006c00</product> <product>ne40e_firmware:v800r006c20</product> <product>ne40e_firmware:v800r006c30</product> <product>ne40e_firmware:v800r007c00</product> <product>ne5000e_firmware:v800r006c00</product> <product>ptn_6900-2-m8_firmware:v800r007c00</product> </cve> <cve id="CVE-2016-6179" level="MEDIUM"> <product>honor_6_firmware:h60-l01c00b850</product> <product>honor_6_firmware:h60-l02c00b850</product> <product>honor_6_firmware:h60-l03c01b850</product> <product>honor_6_firmware:h60-l11c00b850</product> <product>honor_6_firmware:h60-l12c00b850</product> <product>honor_6_firmware:h60-l21c00b850</product> </cve> <cve id="CVE-2016-0323" level="LOW"> <product>bluemix:-</product> </cve> <cve id="CVE-2016-0322" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-0321" level="LOW"> <product>personal_communications:6.0.0</product> <product>personal_communications:6.0.1</product> <product>personal_communications:6.0.2</product> <product>personal_communications:6.0.3</product> <product>personal_communications:6.0.4</product> <product>personal_communications:6.0.5</product> <product>personal_communications:6.0.6</product> <product>personal_communications:6.0.7</product> <product>personal_communications:6.0.8</product> <product>personal_communications:6.0.9</product> <product>personal_communications:6.0.10</product> <product>personal_communications:6.0.11</product> <product>personal_communications:6.0.12</product> <product>personal_communications:6.0.13</product> <product>personal_communications:6.0.14</product> <product>personal_communications:6.0.15</product> <product>personal_communications:6.0.16</product> <product>personal_communications:12.0.0</product> </cve> <cve id="CVE-2016-0320" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-0635" level="LOW"> <product>documaker:12.5</product> <product>enterprise_manager_ops_center:12.1.4</product> <product>enterprise_manager_ops_center:12.2.2</product> <product>enterprise_manager_ops_center:12.3.2</product> <product>health_sciences_information_manager:1.2.8.3</product> <product>health_sciences_information_manager:2.0.2.3</product> <product>health_sciences_information_manager:3.0.1.0</product> <product>healthcare_master_person_index:2.0.12</product> <product>healthcare_master_person_index:3.0.0</product> <product>healthcare_master_person_index:4.0.1</product> <product>insurance_calculation_engine:9.7.1</product> <product>insurance_calculation_engine:10.1.2</product> <product>insurance_calculation_engine:10.2.2</product> <product>insurance_policy_administration_j2ee:9.6.1</product> <product>insurance_policy_administration_j2ee:9.7.1</product> <product>insurance_policy_administration_j2ee:10.0.1</product> <product>insurance_policy_administration_j2ee:10.1.2</product> <product>insurance_policy_administration_j2ee:10.2.0</product> <product>insurance_policy_administration_j2ee:10.2.2</product> <product>insurance_rules_palette:9.6.1</product> <product>insurance_rules_palette:9.7.1</product> <product>insurance_rules_palette:10.0.1</product> <product>insurance_rules_palette:10.1.2</product> <product>insurance_rules_palette:10.2.0</product> <product>insurance_rules_palette:10.2.2</product> <product>primavera_contract_management:14.2</product> <product>primavera_p6_enterprise_project_portfolio_management:8.2</product> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> <product>retail_integration_bus:15.0</product> <product>retail_order_broker_cloud_service:5.1</product> <product>retail_order_broker_cloud_service:5.2</product> <product>retail_order_broker_cloud_service:15.0</product> </cve> <cve id="CVE-2016-0634" level="MEDIUM"> <product>bash:4.3</product> </cve> <cve id="CVE-2016-0325" level="LOW"> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-0324" level="LOW"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> </cve> <cve id="CVE-2016-0329" level="MEDIUM"> <product>emptoris_sourcing:10.0.2.0</product> <product>emptoris_sourcing:10.0.2.2</product> <product>emptoris_sourcing:10.0.2.3</product> <product>emptoris_sourcing:10.0.2.5</product> <product>emptoris_sourcing:10.0.2.6</product> <product>emptoris_sourcing:10.0.2.7</product> <product>emptoris_sourcing:10.0.4.0</product> </cve> <cve id="CVE-2016-0328" level="LOW"> <product>security_guardium_database_activity_monitor:8.2</product> <product>security_guardium_database_activity_monitor:9.0</product> <product>security_guardium_database_activity_monitor:9.1</product> <product>security_guardium_database_activity_monitor:9.5</product> <product>security_guardium_database_activity_monitor:10.0</product> <product>security_guardium_database_activity_monitor:10.1</product> </cve> <cve id="CVE-2016-9913" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-9912" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9911" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9910" level="MEDIUM"> <product>html5lib:0.99999999</product> </cve> <cve id="CVE-2016-9917" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9916" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-9915" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-9914" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-9918" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-10246" level="MEDIUM"> <product>mupdf:1.10</product> </cve> <cve id="CVE-2016-10247" level="MEDIUM"> <product>mupdf:1.10</product> </cve> <cve id="CVE-2016-10248" level="LOW"> <product>jasper:1.900.8</product> </cve> <cve id="CVE-2016-10249" level="MEDIUM"> <product>jasper:1.900.11</product> </cve> <cve id="CVE-2016-8352" level="LOW"> <product>connexium_firmware:-</product> </cve> <cve id="CVE-2016-8353" level="LOW"> <product>pi_web_api_2015_r2:1.5.1</product> </cve> <cve id="CVE-2016-8350" level="MEDIUM"> <product>e1200_series_firmware:2.3</product> <product>e1200_series_firmware:2.4</product> <product>e1200_series_firmware:2.5</product> <product>e2200_series_firmware:3.11</product> <product>e2200_series_firmware:3.12</product> <product>e2200_series_firmware:3.13</product> </cve> <cve id="CVE-2016-8356" level="MEDIUM"> <product>webdatorcentral:-</product> </cve> <cve id="CVE-2016-8357" level="LOW"> <product>jenesys_bas_bridge:1.1.8</product> </cve> <cve id="CVE-2016-8354" level="HIGH"> <product>unity_pro:11.0</product> </cve> <cve id="CVE-2016-8355" level="LOW"> <product>cadd-solis_medication_safety_software:1.0</product> <product>cadd-solis_medication_safety_software:2.0</product> <product>cadd-solis_medication_safety_software:3.0</product> <product>cadd-solis_medication_safety_software:3.1</product> </cve> <cve id="CVE-2016-8358" level="MEDIUM"> <product>cadd-solis_medication_safety_software:1.0</product> <product>cadd-solis_medication_safety_software:2.0</product> <product>cadd-solis_medication_safety_software:3.0</product> <product>cadd-solis_medication_safety_software:3.1</product> </cve> <cve id="CVE-2016-8359" level="MEDIUM"> <product>e1200_series_firmware:2.3</product> <product>e1200_series_firmware:2.4</product> <product>e1200_series_firmware:2.5</product> <product>e2200_series_firmware:3.11</product> <product>e2200_series_firmware:3.12</product> <product>e2200_series_firmware:3.13</product> </cve> <cve id="CVE-2016-10428" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10429" level="LOW"> <product>fsm9055_firmware:-</product> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10424" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10425" level="LOW"> <product>mdm9206_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10426" level="LOW"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10427" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10420" level="MEDIUM"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10421" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10422" level="LOW"> <product>fsm9055_firmware:-</product> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10423" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-4194" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4532" level="LOW"> <product>vtscada:8.0.05</product> <product>vtscada:8.0.12</product> <product>vtscada:8.0.16</product> <product>vtscada:8.0.18</product> <product>vtscada:8.1.05</product> <product>vtscada:8.1.06</product> <product>vtscada:9.0.02</product> <product>vtscada:9.0.03</product> <product>vtscada:9.0.08</product> <product>vtscada:9.1.02</product> <product>vtscada:9.1.03</product> <product>vtscada:9.1.05</product> <product>vtscada:9.1.09</product> <product>vtscada:9.1.11</product> <product>vtscada:9.1.14</product> <product>vtscada:9.1.20</product> <product>vtscada:10.0.11</product> <product>vtscada:10.0.13</product> <product>vtscada:10.0.14</product> <product>vtscada:10.0.16</product> <product>vtscada:10.0.17</product> <product>vtscada:10.1.05</product> <product>vtscada:10.1.06</product> <product>vtscada:10.1.07</product> <product>vtscada:10.1.12</product> <product>vtscada:10.2.05</product> <product>vtscada:10.2.07</product> <product>vtscada:10.2.08</product> <product>vtscada:10.2.11</product> <product>vtscada:10.2.13</product> <product>vtscada:10.2.14</product> <product>vtscada:10.2.15</product> <product>vtscada:10.2.17</product> <product>vtscada:10.2.19</product> <product>vtscada:10.2.20</product> <product>vtscada:10.2.21</product> <product>vtscada:10.2.22</product> <product>vtscada:11.0.05</product> <product>vtscada:11.0.07</product> <product>vtscada:11.1.05</product> <product>vtscada:11.1.06</product> <product>vtscada:11.1.09</product> <product>vtscada:11.1.10</product> <product>vtscada:11.1.13</product> <product>vtscada:11.1.14</product> <product>vtscada:11.1.15</product> <product>vtscada:11.1.16</product> <product>vtscada:11.1.17</product> <product>vtscada:11.1.18</product> <product>vtscada:11.1.19</product> <product>vtscada:11.1.20</product> <product>vtscada:11.1.21</product> <product>vtscada:11.1.22</product> <product>vtscada:11.1.24</product> </cve> <cve id="CVE-2016-4533" level="MEDIUM"> <product>levistudio:-</product> </cve> <cve id="CVE-2016-4530" level="LOW"> <product>pi_sql_data_access_server_2016:1.5</product> </cve> <cve id="CVE-2016-4531" level="LOW"> <product>factorytalk_energrymetrix:2.10.00</product> </cve> <cve id="CVE-2016-4536" level="LOW"> <product>openafs:1.6.16</product> </cve> <cve id="CVE-2016-4195" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4535" level="LOW"> <product>livesafe:14.0</product> </cve> <cve id="CVE-2016-5919" level="LOW"> <product>security_access_manager_for_mobile</product> <product>security_access_manager_9.0_firmware</product> <product>security_access_manager_for_web_7.0_firmware</product> <product>security_access_manager_for_web_8.0_firmware</product> </cve> <cve id="CVE-2016-5918" level="MEDIUM"> <product>tivoli_storage_manager_for_space_management:6.3</product> <product>tivoli_storage_manager_for_space_management:6.4.0.0</product> <product>tivoli_storage_manager_for_space_management:6.4.3.0</product> <product>tivoli_storage_manager_for_space_management:7.1.0.0</product> <product>tivoli_storage_manager_for_space_management:7.1.4.1</product> </cve> <cve id="CVE-2016-9009" level="LOW"> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-9008" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-2242" level="LOW"> <product>exponent_cms:2.0.0</product> <product>exponent_cms:2.0.1</product> <product>exponent_cms:2.0.2</product> <product>exponent_cms:2.0.3</product> <product>exponent_cms:2.0.4</product> <product>exponent_cms:2.0.4</product> <product>exponent_cms:2.0.5</product> <product>exponent_cms:2.0.5</product> <product>exponent_cms:2.0.6</product> <product>exponent_cms:2.0.6</product> <product>exponent_cms:2.0.7</product> <product>exponent_cms:2.0.8</product> <product>exponent_cms:2.0.8</product> <product>exponent_cms:2.0.9</product> <product>exponent_cms:2.0.9</product> <product>exponent_cms:2.1.0</product> <product>exponent_cms:2.1.1</product> <product>exponent_cms:2.1.2</product> <product>exponent_cms:2.1.3</product> <product>exponent_cms:2.1.4</product> <product>exponent_cms:2.1.4</product> <product>exponent_cms:2.2.0</product> <product>exponent_cms:2.2.0</product> <product>exponent_cms:2.2.1</product> <product>exponent_cms:2.2.2</product> <product>exponent_cms:2.2.2</product> <product>exponent_cms:2.2.3</product> <product>exponent_cms:2.2.3</product> <product>exponent_cms:2.3.0</product> <product>exponent_cms:2.3.0</product> <product>exponent_cms:2.3.1</product> <product>exponent_cms:2.3.1</product> <product>exponent_cms:2.3.2</product> <product>exponent_cms:2.3.2</product> <product>exponent_cms:2.3.3</product> <product>exponent_cms:2.3.3</product> <product>exponent_cms:2.3.4</product> <product>exponent_cms:2.3.4</product> <product>exponent_cms:2.3.5</product> <product>exponent_cms:2.3.5</product> <product>exponent_cms:2.3.7</product> <product>exponent_cms:2.3.8</product> </cve> <cve id="CVE-2016-2243" level="MEDIUM"> <product>elitebook_folio_1012_x2_g2:-</product> <product>1000_series_firmware:1.1</product> <product>1000_series_firmware:1.04</product> <product>700_series_firmware:1.05</product> <product>700_series_firmware:1.08</product> <product>700_series_firmware:2.05</product> <product>700_series_firmware:2.07</product> <product>700_series_firmware:2.09</product> <product>800_series_firmware:2.1</product> <product>800_series_firmware:2.09</product> <product>z238_firmware:1.11</product> <product>z240_firmware:1.11</product> <product>zbook_firmware:1.03</product> <product>zbook_firmware:1.04</product> </cve> <cve id="CVE-2016-9006" level="MEDIUM"> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.1.2</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> <product>urbancode_deploy:6.2.3.0</product> <product>urbancode_deploy:6.2.3.1</product> </cve> <cve id="CVE-2016-2246" level="LOW"> <product>thinpro:4.4</product> <product>thinpro:5.0</product> <product>thinpro:5.1</product> <product>thinpro:5.2</product> <product>thinpro:5.2.1</product> <product>thinpro:6.0</product> <product>thinpro:6.1</product> </cve> <cve id="CVE-2016-9000" level="MEDIUM"> <product>infosphere_datastage:8.7</product> <product>infosphere_datastage:9.1</product> <product>infosphere_datastage:11.3</product> <product>infosphere_datastage:11.5</product> <product>infosphere_information_server_on_cloud:11.5</product> </cve> <cve id="CVE-2016-2244" level="LOW"> <product>futuresmart_firmware:3.7</product> </cve> <cve id="CVE-2016-2245" level="LOW"> <product>support_assistant:8.1.40.3</product> </cve> <cve id="CVE-2016-4036" level="LOW"> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3379" level="MEDIUM"> <product>exchange_server:2016</product> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-3377" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-5669" level="LOW"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-5668" level="LOW"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-5664" level="LOW"> <product>kiteworks_appliance:kw2016.03.00</product> </cve> <cve id="CVE-2016-5667" level="LOW"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-5666" level="LOW"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-5661" level="LOW"> <product>civic_platform_citizen_access_portal:-</product> </cve> <cve id="CVE-2016-5660" level="MEDIUM"> <product>civic_platform_citizen_access_portal:-</product> </cve> <cve id="CVE-2016-5663" level="MEDIUM"> <product>kiteworks_appliance:kw2016.03.00</product> </cve> <cve id="CVE-2016-5662" level="LOW"> <product>kiteworks_appliance:kw2016.03.00</product> </cve> <cve id="CVE-2016-8876" level="MEDIUM"> <product>phantompdf:8.0.5</product> <product>reader:8.0.5</product> </cve> <cve id="CVE-2016-6369" level="LOW"> <product>anyconnect_secure_mobility_client:2.0.0343</product> <product>anyconnect_secure_mobility_client:2.1.0148</product> <product>anyconnect_secure_mobility_client:2.2.0133</product> <product>anyconnect_secure_mobility_client:2.2.0136</product> <product>anyconnect_secure_mobility_client:2.2.0140</product> <product>anyconnect_secure_mobility_client:2.3.0185</product> <product>anyconnect_secure_mobility_client:2.3.0254</product> <product>anyconnect_secure_mobility_client:2.3.1003</product> <product>anyconnect_secure_mobility_client:2.3.2016</product> <product>anyconnect_secure_mobility_client:2.4.0202</product> <product>anyconnect_secure_mobility_client:2.4.1012</product> <product>anyconnect_secure_mobility_client:2.5.0217</product> <product>anyconnect_secure_mobility_client:2.5.2006</product> <product>anyconnect_secure_mobility_client:2.5.2010</product> <product>anyconnect_secure_mobility_client:2.5.2011</product> <product>anyconnect_secure_mobility_client:2.5.2014</product> <product>anyconnect_secure_mobility_client:2.5.2017</product> <product>anyconnect_secure_mobility_client:2.5.2018</product> <product>anyconnect_secure_mobility_client:2.5.2019</product> <product>anyconnect_secure_mobility_client:2.5.3041</product> <product>anyconnect_secure_mobility_client:2.5.3046</product> <product>anyconnect_secure_mobility_client:2.5.3051</product> <product>anyconnect_secure_mobility_client:2.5.3054</product> <product>anyconnect_secure_mobility_client:2.5.3055</product> <product>anyconnect_secure_mobility_client:2.5_base</product> <product>anyconnect_secure_mobility_client:3.0.0</product> <product>anyconnect_secure_mobility_client:3.0.0629</product> <product>anyconnect_secure_mobility_client:3.0.1047</product> <product>anyconnect_secure_mobility_client:3.0.2052</product> <product>anyconnect_secure_mobility_client:3.0.3050</product> <product>anyconnect_secure_mobility_client:3.0.3054</product> <product>anyconnect_secure_mobility_client:3.0.4235</product> <product>anyconnect_secure_mobility_client:3.0.5075</product> <product>anyconnect_secure_mobility_client:3.0.5080</product> <product>anyconnect_secure_mobility_client:3.0.09231</product> <product>anyconnect_secure_mobility_client:3.0.09266</product> <product>anyconnect_secure_mobility_client:3.0.09353</product> <product>anyconnect_secure_mobility_client:3.1%2860%29</product> <product>anyconnect_secure_mobility_client:3.1.0</product> <product>anyconnect_secure_mobility_client:3.1.02043</product> <product>anyconnect_secure_mobility_client:3.1.05182</product> <product>anyconnect_secure_mobility_client:3.1.05187</product> <product>anyconnect_secure_mobility_client:3.1.06073</product> <product>anyconnect_secure_mobility_client:3.1.07021</product> <product>anyconnect_secure_mobility_client:4.0%2848%29</product> <product>anyconnect_secure_mobility_client:4.0%2864%29</product> <product>anyconnect_secure_mobility_client:4.0%282049%29</product> <product>anyconnect_secure_mobility_client:4.0.0</product> <product>anyconnect_secure_mobility_client:4.0.00048</product> <product>anyconnect_secure_mobility_client:4.0.00051</product> <product>anyconnect_secure_mobility_client:4.1%288%29</product> <product>anyconnect_secure_mobility_client:4.1.0</product> <product>anyconnect_secure_mobility_client:4.2.0</product> <product>anyconnect_secure_mobility_client:4.2.04039</product> <product>anyconnect_secure_mobility_client:4.3.0</product> <product>anyconnect_secure_mobility_client:4.3.00748</product> <product>anyconnect_secure_mobility_client:4.3.01095</product> </cve> <cve id="CVE-2016-6368" level="LOW"> <product>firepower_management_center:6.0.0</product> <product>firepower_management_center:6.0.0.0</product> <product>firepower_management_center:6.0.0.1</product> <product>firepower_management_center:6.0.1</product> </cve> <cve id="CVE-2016-6361" level="LOW"> <product>aironet_access_point_software:8.1%2815.14%29</product> <product>aironet_access_point_software:8.1%28112.3%29</product> <product>aironet_access_point_software:8.1%28112.4%29</product> <product>aironet_access_point_software:8.1%28131.0%29</product> <product>aironet_access_point_software:8.2%28100.0%29</product> <product>aironet_access_point_software:8.2%28102.43%29</product> <product>aironet_access_point_software:8.3.0</product> </cve> <cve id="CVE-2016-6360" level="LOW"> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> <product>web_security_appliance:8.8.0-085</product> <product>web_security_appliance:9.0.0-193</product> <product>web_security_appliance:9.0_base</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1.0-070</product> <product>web_security_appliance:9.1_base</product> <product>web_security_appliance:9.5.0-235</product> <product>web_security_appliance:9.5.0-284</product> <product>web_security_appliance:9.5.0-444</product> <product>web_security_appliance:9.5_base</product> </cve> <cve id="CVE-2016-6363" level="LOW"> <product>aironet_access_point_software:8.1%2815.14%29</product> <product>aironet_access_point_software:8.1%28112.3%29</product> <product>aironet_access_point_software:8.1%28112.4%29</product> <product>aironet_access_point_software:8.1%28131.0%29</product> <product>aironet_access_point_software:8.2%28100.0%29</product> <product>aironet_access_point_software:8.2%28102.43%29</product> <product>aironet_access_point_software:8.3.0</product> </cve> <cve id="CVE-2016-6362" level="LOW"> <product>aironet_access_point_software:8.1%2815.14%29</product> <product>aironet_access_point_software:8.1%28112.3%29</product> <product>aironet_access_point_software:8.1%28112.4%29</product> <product>aironet_access_point_software:8.1%28131.0%29</product> <product>aironet_access_point_software:8.2%28100.0%29</product> <product>aironet_access_point_software:8.2%28102.43%29</product> <product>aironet_access_point_software:8.3.0</product> </cve> <cve id="CVE-2016-6365" level="MEDIUM"> <product>firepower_management_center:4.10.3</product> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.0.2</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.4.0</product> </cve> <cve id="CVE-2016-6364" level="LOW"> <product>unified_communications_manager:11.5.0</product> </cve> <cve id="CVE-2016-6367" level="LOW"> <product>adaptive_security_appliance_software:7.0.1</product> <product>adaptive_security_appliance_software:7.0.1.4</product> <product>adaptive_security_appliance_software:7.0.2</product> <product>adaptive_security_appliance_software:7.0.3</product> <product>adaptive_security_appliance_software:7.0.4</product> <product>adaptive_security_appliance_software:7.0.4.2</product> <product>adaptive_security_appliance_software:7.0.5</product> <product>adaptive_security_appliance_software:7.0.5.12</product> <product>adaptive_security_appliance_software:7.0.6</product> <product>adaptive_security_appliance_software:7.0.6.4</product> <product>adaptive_security_appliance_software:7.0.6.8</product> <product>adaptive_security_appliance_software:7.0.6.18</product> <product>adaptive_security_appliance_software:7.0.6.22</product> <product>adaptive_security_appliance_software:7.0.6.26</product> <product>adaptive_security_appliance_software:7.0.6.29</product> <product>adaptive_security_appliance_software:7.0.6.32</product> <product>adaptive_security_appliance_software:7.0.7</product> <product>adaptive_security_appliance_software:7.0.7.1</product> <product>adaptive_security_appliance_software:7.0.7.4</product> <product>adaptive_security_appliance_software:7.0.7.9</product> <product>adaptive_security_appliance_software:7.0.7.12</product> <product>adaptive_security_appliance_software:7.0.8</product> <product>adaptive_security_appliance_software:7.0.8.2</product> <product>adaptive_security_appliance_software:7.0.8.8</product> <product>adaptive_security_appliance_software:7.0.8.12</product> <product>adaptive_security_appliance_software:7.0.8.13</product> <product>adaptive_security_appliance_software:7.1.2</product> <product>adaptive_security_appliance_software:7.1.2.16</product> <product>adaptive_security_appliance_software:7.1.2.20</product> <product>adaptive_security_appliance_software:7.1.2.24</product> <product>adaptive_security_appliance_software:7.1.2.28</product> <product>adaptive_security_appliance_software:7.1.2.38</product> <product>adaptive_security_appliance_software:7.1.2.42</product> <product>adaptive_security_appliance_software:7.1.2.46</product> <product>adaptive_security_appliance_software:7.1.2.49</product> <product>adaptive_security_appliance_software:7.1.2.53</product> <product>adaptive_security_appliance_software:7.1.2.61</product> <product>adaptive_security_appliance_software:7.1.2.64</product> <product>adaptive_security_appliance_software:7.1.2.72</product> <product>adaptive_security_appliance_software:7.1.2.81</product> <product>adaptive_security_appliance_software:7.2.1</product> <product>adaptive_security_appliance_software:7.2.1.9</product> <product>adaptive_security_appliance_software:7.2.1.13</product> <product>adaptive_security_appliance_software:7.2.1.19</product> <product>adaptive_security_appliance_software:7.2.1.24</product> <product>adaptive_security_appliance_software:7.2.2</product> <product>adaptive_security_appliance_software:7.2.2.6</product> <product>adaptive_security_appliance_software:7.2.2.10</product> <product>adaptive_security_appliance_software:7.2.2.14</product> <product>adaptive_security_appliance_software:7.2.2.18</product> <product>adaptive_security_appliance_software:7.2.2.19</product> <product>adaptive_security_appliance_software:7.2.2.22</product> <product>adaptive_security_appliance_software:7.2.2.34</product> <product>adaptive_security_appliance_software:7.2.3</product> <product>adaptive_security_appliance_software:7.2.3.1</product> <product>adaptive_security_appliance_software:7.2.3.12</product> <product>adaptive_security_appliance_software:7.2.3.16</product> <product>adaptive_security_appliance_software:7.2.4</product> <product>adaptive_security_appliance_software:7.2.4.6</product> <product>adaptive_security_appliance_software:7.2.4.9</product> <product>adaptive_security_appliance_software:7.2.4.18</product> <product>adaptive_security_appliance_software:7.2.4.25</product> <product>adaptive_security_appliance_software:7.2.4.27</product> <product>adaptive_security_appliance_software:7.2.4.30</product> <product>adaptive_security_appliance_software:7.2.4.33</product> <product>adaptive_security_appliance_software:7.2.5</product> <product>adaptive_security_appliance_software:7.2.5.2</product> <product>adaptive_security_appliance_software:7.2.5.4</product> <product>adaptive_security_appliance_software:7.2.5.7</product> <product>adaptive_security_appliance_software:7.2.5.8</product> <product>adaptive_security_appliance_software:7.2.5.10</product> <product>adaptive_security_appliance_software:7.2.5.12</product> <product>adaptive_security_appliance_software:7.2.5.16</product> <product>adaptive_security_appliance_software:8.0.1.2</product> <product>adaptive_security_appliance_software:8.0.2</product> <product>adaptive_security_appliance_software:8.0.2.11</product> <product>adaptive_security_appliance_software:8.0.2.15</product> <product>adaptive_security_appliance_software:8.0.3</product> <product>adaptive_security_appliance_software:8.0.3.6</product> <product>adaptive_security_appliance_software:8.0.3.12</product> <product>adaptive_security_appliance_software:8.0.3.19</product> <product>adaptive_security_appliance_software:8.0.4</product> <product>adaptive_security_appliance_software:8.0.4.3</product> <product>adaptive_security_appliance_software:8.0.4.9</product> <product>adaptive_security_appliance_software:8.0.4.16</product> <product>adaptive_security_appliance_software:8.0.4.23</product> <product>adaptive_security_appliance_software:8.0.4.25</product> <product>adaptive_security_appliance_software:8.0.4.28</product> <product>adaptive_security_appliance_software:8.0.4.31</product> <product>adaptive_security_appliance_software:8.0.4.32</product> <product>adaptive_security_appliance_software:8.0.4.33</product> <product>adaptive_security_appliance_software:8.0.5</product> <product>adaptive_security_appliance_software:8.0.5.20</product> <product>adaptive_security_appliance_software:8.0.5.23</product> <product>adaptive_security_appliance_software:8.0.5.25</product> <product>adaptive_security_appliance_software:8.0.5.27</product> <product>adaptive_security_appliance_software:8.0.5.28</product> <product>adaptive_security_appliance_software:8.0.5.31</product> <product>adaptive_security_appliance_software:8.1.0.104</product> <product>adaptive_security_appliance_software:8.1.1</product> <product>adaptive_security_appliance_software:8.1.1.6</product> <product>adaptive_security_appliance_software:8.1.2</product> <product>adaptive_security_appliance_software:8.1.2.13</product> <product>adaptive_security_appliance_software:8.1.2.15</product> <product>adaptive_security_appliance_software:8.1.2.16</product> <product>adaptive_security_appliance_software:8.1.2.19</product> <product>adaptive_security_appliance_software:8.1.2.23</product> <product>adaptive_security_appliance_software:8.1.2.24</product> <product>adaptive_security_appliance_software:8.1.2.49</product> <product>adaptive_security_appliance_software:8.1.2.50</product> <product>adaptive_security_appliance_software:8.1.2.55</product> <product>adaptive_security_appliance_software:8.1.2.56</product> <product>adaptive_security_appliance_software:8.2.0.45</product> <product>adaptive_security_appliance_software:8.2.1</product> <product>adaptive_security_appliance_software:8.2.1.11</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.2.9</product> <product>adaptive_security_appliance_software:8.2.2.10</product> <product>adaptive_security_appliance_software:8.2.2.12</product> <product>adaptive_security_appliance_software:8.2.2.16</product> <product>adaptive_security_appliance_software:8.2.2.17</product> <product>adaptive_security_appliance_software:8.2.3</product> <product>adaptive_security_appliance_software:8.2.4</product> <product>adaptive_security_appliance_software:8.2.4.1</product> <product>adaptive_security_appliance_software:8.2.4.4</product> <product>adaptive_security_appliance_software:8.2.5</product> <product>adaptive_security_appliance_software:8.2.5.13</product> <product>adaptive_security_appliance_software:8.2.5.22</product> <product>adaptive_security_appliance_software:8.2.5.26</product> <product>adaptive_security_appliance_software:8.2.5.33</product> <product>adaptive_security_appliance_software:8.2.5.40</product> <product>adaptive_security_appliance_software:8.2.5.41</product> <product>adaptive_security_appliance_software:8.2.5.46</product> <product>adaptive_security_appliance_software:8.2.5.48</product> <product>adaptive_security_appliance_software:8.2.5.50</product> <product>adaptive_security_appliance_software:8.2.5.52</product> <product>adaptive_security_appliance_software:8.2.5.55</product> <product>adaptive_security_appliance_software:8.2.5.57</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.1.1</product> <product>adaptive_security_appliance_software:8.3.1.4</product> <product>adaptive_security_appliance_software:8.3.1.6</product> <product>adaptive_security_appliance_software:8.3.2</product> <product>adaptive_security_appliance_software:8.3.2.4</product> <product>adaptive_security_appliance_software:8.3.2.13</product> <product>adaptive_security_appliance_software:8.3.2.23</product> <product>adaptive_security_appliance_software:8.3.2.25</product> <product>adaptive_security_appliance_software:8.3.2.31</product> <product>adaptive_security_appliance_software:8.3.2.33</product> <product>adaptive_security_appliance_software:8.3.2.34</product> <product>adaptive_security_appliance_software:8.3.2.37</product> <product>adaptive_security_appliance_software:8.3.2.39</product> <product>adaptive_security_appliance_software:8.3.2.40</product> <product>adaptive_security_appliance_software:8.3.2.41</product> <product>adaptive_security_appliance_software:8.3.2.44</product> </cve> <cve id="CVE-2016-6366" level="MEDIUM"> <product>adaptive_security_appliance_software:7.0.1</product> <product>adaptive_security_appliance_software:7.0.1.4</product> <product>adaptive_security_appliance_software:7.0.2</product> <product>adaptive_security_appliance_software:7.0.3</product> <product>adaptive_security_appliance_software:7.0.4</product> <product>adaptive_security_appliance_software:7.0.4.2</product> <product>adaptive_security_appliance_software:7.0.5</product> <product>adaptive_security_appliance_software:7.0.5.12</product> <product>adaptive_security_appliance_software:7.0.6</product> <product>adaptive_security_appliance_software:7.0.6.4</product> <product>adaptive_security_appliance_software:7.0.6.8</product> <product>adaptive_security_appliance_software:7.0.6.18</product> <product>adaptive_security_appliance_software:7.0.6.22</product> <product>adaptive_security_appliance_software:7.0.6.26</product> <product>adaptive_security_appliance_software:7.0.6.29</product> <product>adaptive_security_appliance_software:7.0.6.32</product> <product>adaptive_security_appliance_software:7.0.7</product> <product>adaptive_security_appliance_software:7.0.7.1</product> <product>adaptive_security_appliance_software:7.0.7.4</product> <product>adaptive_security_appliance_software:7.0.7.9</product> <product>adaptive_security_appliance_software:7.0.7.12</product> <product>adaptive_security_appliance_software:7.0.8</product> <product>adaptive_security_appliance_software:7.0.8.2</product> <product>adaptive_security_appliance_software:7.0.8.8</product> <product>adaptive_security_appliance_software:7.0.8.12</product> <product>adaptive_security_appliance_software:7.0.8.13</product> <product>adaptive_security_appliance_software:7.1.2</product> <product>adaptive_security_appliance_software:7.1.2.16</product> <product>adaptive_security_appliance_software:7.1.2.20</product> <product>adaptive_security_appliance_software:7.1.2.24</product> <product>adaptive_security_appliance_software:7.1.2.28</product> <product>adaptive_security_appliance_software:7.1.2.38</product> <product>adaptive_security_appliance_software:7.1.2.42</product> <product>adaptive_security_appliance_software:7.1.2.46</product> <product>adaptive_security_appliance_software:7.1.2.49</product> <product>adaptive_security_appliance_software:7.1.2.53</product> <product>adaptive_security_appliance_software:7.1.2.61</product> <product>adaptive_security_appliance_software:7.1.2.64</product> <product>adaptive_security_appliance_software:7.1.2.72</product> <product>adaptive_security_appliance_software:7.1.2.81</product> <product>adaptive_security_appliance_software:7.2.1</product> <product>adaptive_security_appliance_software:7.2.1.9</product> <product>adaptive_security_appliance_software:7.2.1.13</product> <product>adaptive_security_appliance_software:7.2.1.19</product> <product>adaptive_security_appliance_software:7.2.1.24</product> <product>adaptive_security_appliance_software:7.2.2</product> <product>adaptive_security_appliance_software:7.2.2.6</product> <product>adaptive_security_appliance_software:7.2.2.10</product> <product>adaptive_security_appliance_software:7.2.2.14</product> <product>adaptive_security_appliance_software:7.2.2.18</product> <product>adaptive_security_appliance_software:7.2.2.19</product> <product>adaptive_security_appliance_software:7.2.2.22</product> <product>adaptive_security_appliance_software:7.2.2.34</product> <product>adaptive_security_appliance_software:7.2.3</product> <product>adaptive_security_appliance_software:7.2.3.1</product> <product>adaptive_security_appliance_software:7.2.3.12</product> <product>adaptive_security_appliance_software:7.2.3.16</product> <product>adaptive_security_appliance_software:7.2.4</product> <product>adaptive_security_appliance_software:7.2.4.6</product> <product>adaptive_security_appliance_software:7.2.4.9</product> <product>adaptive_security_appliance_software:7.2.4.18</product> <product>adaptive_security_appliance_software:7.2.4.25</product> <product>adaptive_security_appliance_software:7.2.4.27</product> <product>adaptive_security_appliance_software:7.2.4.30</product> <product>adaptive_security_appliance_software:7.2.4.33</product> <product>adaptive_security_appliance_software:7.2.5</product> <product>adaptive_security_appliance_software:7.2.5.2</product> <product>adaptive_security_appliance_software:7.2.5.4</product> <product>adaptive_security_appliance_software:7.2.5.7</product> <product>adaptive_security_appliance_software:7.2.5.8</product> <product>adaptive_security_appliance_software:7.2.5.10</product> <product>adaptive_security_appliance_software:7.2.5.12</product> <product>adaptive_security_appliance_software:7.2.5.16</product> <product>adaptive_security_appliance_software:8.0.1.2</product> <product>adaptive_security_appliance_software:8.0.2</product> <product>adaptive_security_appliance_software:8.0.2.11</product> <product>adaptive_security_appliance_software:8.0.2.15</product> <product>adaptive_security_appliance_software:8.0.3</product> <product>adaptive_security_appliance_software:8.0.3.6</product> <product>adaptive_security_appliance_software:8.0.3.12</product> <product>adaptive_security_appliance_software:8.0.3.19</product> <product>adaptive_security_appliance_software:8.0.4</product> <product>adaptive_security_appliance_software:8.0.4.3</product> <product>adaptive_security_appliance_software:8.0.4.9</product> <product>adaptive_security_appliance_software:8.0.4.16</product> <product>adaptive_security_appliance_software:8.0.4.23</product> <product>adaptive_security_appliance_software:8.0.4.25</product> <product>adaptive_security_appliance_software:8.0.4.28</product> <product>adaptive_security_appliance_software:8.0.4.31</product> <product>adaptive_security_appliance_software:8.0.4.32</product> <product>adaptive_security_appliance_software:8.0.4.33</product> <product>adaptive_security_appliance_software:8.0.5</product> <product>adaptive_security_appliance_software:8.0.5.20</product> <product>adaptive_security_appliance_software:8.0.5.23</product> <product>adaptive_security_appliance_software:8.0.5.25</product> <product>adaptive_security_appliance_software:8.0.5.27</product> <product>adaptive_security_appliance_software:8.0.5.28</product> <product>adaptive_security_appliance_software:8.0.5.31</product> <product>adaptive_security_appliance_software:8.1.0.104</product> <product>adaptive_security_appliance_software:8.1.1</product> <product>adaptive_security_appliance_software:8.1.1.6</product> <product>adaptive_security_appliance_software:8.1.2</product> <product>adaptive_security_appliance_software:8.1.2.13</product> <product>adaptive_security_appliance_software:8.1.2.15</product> <product>adaptive_security_appliance_software:8.1.2.16</product> <product>adaptive_security_appliance_software:8.1.2.19</product> <product>adaptive_security_appliance_software:8.1.2.23</product> <product>adaptive_security_appliance_software:8.1.2.24</product> <product>adaptive_security_appliance_software:8.1.2.49</product> <product>adaptive_security_appliance_software:8.1.2.50</product> <product>adaptive_security_appliance_software:8.1.2.55</product> <product>adaptive_security_appliance_software:8.1.2.56</product> <product>adaptive_security_appliance_software:8.2.0.45</product> <product>adaptive_security_appliance_software:8.2.1</product> <product>adaptive_security_appliance_software:8.2.1.11</product> <product>adaptive_security_appliance_software:8.2.2</product> <product>adaptive_security_appliance_software:8.2.2.9</product> <product>adaptive_security_appliance_software:8.2.2.10</product> <product>adaptive_security_appliance_software:8.2.2.12</product> <product>adaptive_security_appliance_software:8.2.2.16</product> <product>adaptive_security_appliance_software:8.2.2.17</product> <product>adaptive_security_appliance_software:8.2.3</product> <product>adaptive_security_appliance_software:8.2.4</product> <product>adaptive_security_appliance_software:8.2.4.1</product> <product>adaptive_security_appliance_software:8.2.4.4</product> <product>adaptive_security_appliance_software:8.2.5</product> <product>adaptive_security_appliance_software:8.2.5.13</product> <product>adaptive_security_appliance_software:8.2.5.22</product> <product>adaptive_security_appliance_software:8.2.5.26</product> <product>adaptive_security_appliance_software:8.2.5.33</product> <product>adaptive_security_appliance_software:8.2.5.40</product> <product>adaptive_security_appliance_software:8.2.5.41</product> <product>adaptive_security_appliance_software:8.2.5.46</product> <product>adaptive_security_appliance_software:8.2.5.48</product> <product>adaptive_security_appliance_software:8.2.5.50</product> <product>adaptive_security_appliance_software:8.2.5.52</product> <product>adaptive_security_appliance_software:8.2.5.55</product> <product>adaptive_security_appliance_software:8.2.5.57</product> <product>adaptive_security_appliance_software:8.3.1</product> <product>adaptive_security_appliance_software:8.3.1.1</product> <product>adaptive_security_appliance_software:8.3.1.4</product> <product>adaptive_security_appliance_software:8.3.1.6</product> <product>adaptive_security_appliance_software:8.3.2</product> <product>adaptive_security_appliance_software:8.3.2.4</product> <product>adaptive_security_appliance_software:8.3.2.13</product> <product>adaptive_security_appliance_software:8.3.2.23</product> <product>adaptive_security_appliance_software:8.3.2.25</product> <product>adaptive_security_appliance_software:8.3.2.31</product> <product>adaptive_security_appliance_software:8.3.2.33</product> <product>adaptive_security_appliance_software:8.3.2.34</product> <product>adaptive_security_appliance_software:8.3.2.37</product> <product>adaptive_security_appliance_software:8.3.2.39</product> <product>adaptive_security_appliance_software:8.3.2.40</product> <product>adaptive_security_appliance_software:8.3.2.41</product> <product>adaptive_security_appliance_software:8.3.2.44</product> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:8.5.1</product> <product>adaptive_security_appliance_software:8.5.1.1</product> <product>adaptive_security_appliance_software:8.5.1.6</product> <product>adaptive_security_appliance_software:8.5.1.7</product> <product>adaptive_security_appliance_software:8.5.1.14</product> <product>adaptive_security_appliance_software:8.5.1.17</product> <product>adaptive_security_appliance_software:8.5.1.18</product> <product>adaptive_security_appliance_software:8.5.1.19</product> <product>adaptive_security_appliance_software:8.5.1.21</product> <product>adaptive_security_appliance_software:8.5.1.24</product> <product>adaptive_security_appliance_software:8.6.1</product> <product>adaptive_security_appliance_software:8.6.1.1</product> <product>adaptive_security_appliance_software:8.6.1.2</product> <product>adaptive_security_appliance_software:8.6.1.5</product> <product>adaptive_security_appliance_software:8.6.1.10</product> <product>adaptive_security_appliance_software:8.6.1.12</product> <product>adaptive_security_appliance_software:8.6.1.13</product> <product>adaptive_security_appliance_software:8.6.1.14</product> <product>adaptive_security_appliance_software:8.6.1.17</product> <product>adaptive_security_appliance_software:8.7.1</product> <product>adaptive_security_appliance_software:8.7.1.1</product> <product>adaptive_security_appliance_software:8.7.1.3</product> <product>adaptive_security_appliance_software:8.7.1.4</product> <product>adaptive_security_appliance_software:8.7.1.7</product> <product>adaptive_security_appliance_software:8.7.1.8</product> <product>adaptive_security_appliance_software:8.7.1.11</product> <product>adaptive_security_appliance_software:8.7.1.13</product> <product>adaptive_security_appliance_software:8.7.1.16</product> <product>adaptive_security_appliance_software:8.7.1.17</product> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.2</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>firepower_services_software_for_asa:5.4.0</product> <product>firepower_services_software_for_asa:5.4.1</product> <product>firepower_services_software_for_asa:5.4.1.1</product> <product>firepower_services_software_for_asa:5.4.1.2</product> <product>firepower_services_software_for_asa:5.4.1.3</product> <product>firepower_services_software_for_asa:5.4.1.4</product> <product>firepower_services_software_for_asa:5.4.1.5</product> <product>firepower_services_software_for_asa:5.4.1.6</product> <product>firepower_services_software_for_asa:5.4.1.7</product> <product>firepower_threat_defense_software:6.0.0</product> <product>firepower_threat_defense_software:6.0.1</product> <product>asa_1000v_cloud_firewall_software:8.7.1</product> <product>asa_1000v_cloud_firewall_software:8.7.1.1</product> <product>pix_firewall:501_base</product> <product>pix_firewall:506_base</product> <product>pix_firewall:515_base</product> <product>pix_firewall:515e_base</product> <product>pix_firewall:520_base</product> <product>pix_firewall:525_6.3</product> <product>pix_firewall:525_base</product> <product>pix_firewall:535_base</product> <product>pix_firewall:base</product> </cve> <cve id="CVE-2016-9005" level="LOW"> <product>system_storage_ts3100-ts3200_tape_library:d.60</product> </cve> <cve id="CVE-2016-8870" level="MEDIUM"> <product>joomla%21:3.6.3</product> </cve> <cve id="CVE-2016-4878" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-1156" level="MEDIUM"> <product>line:4.3.0.724</product> <product>line:4.3.1</product> </cve> <cve id="CVE-2016-10653" level="MEDIUM"> <product>xd-testing:-</product> </cve> <cve id="CVE-2016-10652" level="MEDIUM"> <product>prebuild-lwip:0.0.4</product> </cve> <cve id="CVE-2016-10651" level="MEDIUM"> <product>webdriver-launcher:-</product> </cve> <cve id="CVE-2016-1154" level="LOW"> <product>ec-cube_help_plugin:1.3.5</product> </cve> <cve id="CVE-2016-10657" level="MEDIUM"> <product>co-cli-installer:-</product> </cve> <cve id="CVE-2016-10656" level="MEDIUM"> <product>qbs:-</product> </cve> <cve id="CVE-2016-10655" level="MEDIUM"> <product>clang-extra:-</product> </cve> <cve id="CVE-2016-10654" level="MEDIUM"> <product>sfml:0.0.3</product> </cve> <cve id="CVE-2016-10659" level="MEDIUM"> <product>poco:1.7.7</product> </cve> <cve id="CVE-2016-10658" level="MEDIUM"> <product>native-opencv:3.0.0b</product> </cve> <cve id="CVE-2016-6581" level="LOW"> <product>hpack:1.0</product> <product>hpack:2.0</product> <product>hpack:2.0.1</product> <product>hpack:2.1.1</product> <product>hpack:2.2</product> <product>hyper:0.4</product> <product>hyper:0.6</product> </cve> <cve id="CVE-2016-6580" level="LOW"> <product>python_priority_library:1.0.0</product> <product>python_priority_library:1.1.0</product> <product>python_priority_library:1.1.1</product> </cve> <cve id="CVE-2016-6582" level="LOW"> <product>doorkeeper:4.1.0</product> </cve> <cve id="CVE-2016-8638" level="LOW"> <product>ipsilon:1.0.0</product> <product>ipsilon:1.0.1</product> <product>ipsilon:1.0.2</product> <product>ipsilon:1.1.0</product> <product>ipsilon:1.1.1</product> <product>ipsilon:1.2.0</product> <product>ipsilon:2.0.0</product> <product>ipsilon:2.0.1</product> </cve> <cve id="CVE-2016-8987" level="LOW"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> </cve> <cve id="CVE-2016-8986" level="LOW"> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-8982" level="LOW"> <product>infosphere_datastage:8.7</product> <product>infosphere_datastage:9.1</product> <product>infosphere_datastage:11.3</product> </cve> <cve id="CVE-2016-8981" level="LOW"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8980" level="LOW"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-0408" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0409" level="LOW"> <product>peoplesoft_products:9.1</product> <product>peoplesoft_products:9.2</product> </cve> <cve id="CVE-2016-0400" level="MEDIUM"> <product>websphere_extreme_scale:7.1.0</product> <product>websphere_extreme_scale:7.1.0.2</product> <product>websphere_extreme_scale:7.1.1</product> <product>websphere_extreme_scale:8.5.0</product> <product>websphere_extreme_scale:8.5.0.1</product> <product>websphere_extreme_scale:8.5.0.2</product> <product>websphere_extreme_scale:8.6.0.0</product> <product>websphere_extreme_scale:8.6.0.1</product> <product>websphere_extreme_scale:8.6.0.2</product> <product>websphere_extreme_scale:8.6.0.3</product> <product>websphere_extreme_scale:8.6.0.4</product> <product>websphere_extreme_scale:8.6.0.5</product> <product>websphere_extreme_scale:8.6.0.6</product> <product>websphere_extreme_scale:8.6.0.7</product> </cve> <cve id="CVE-2016-0401" level="MEDIUM"> <product>fusion_middleware:11.1.1.7.0</product> <product>fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-0407" level="LOW"> <product>peoplesoft_enterprise_human_capital_management_human_resources:9.1</product> <product>peoplesoft_enterprise_human_capital_management_human_resources:9.2</product> </cve> <cve id="CVE-2016-0404" level="MEDIUM"> <product>fusion_middleware:11.1.2.2</product> </cve> <cve id="CVE-2016-0405" level="LOW"> <product>oracle_and_sun_systems_product_suite:3.3</product> <product>oracle_and_sun_systems_product_suite:4.0</product> </cve> <cve id="CVE-2016-4327" level="MEDIUM"> <product>enablement_server_for_java:6.6-20090827-1616</product> </cve> <cve id="CVE-2016-4326" level="LOW"> <product>chef_manage:1.11.4</product> </cve> <cve id="CVE-2016-4325" level="LOW"> <product>xprintserver_firmware:3.3.0</product> </cve> <cve id="CVE-2016-4988" level="MEDIUM"> <product>build_failure_analyzer:1.15.0</product> </cve> <cve id="CVE-2016-1202" level="LOW"> <product>electron:0.33.4</product> </cve> <cve id="CVE-2016-1201" level="MEDIUM"> <product>ec-cube:3.0.0</product> <product>ec-cube:3.0.1</product> <product>ec-cube:3.0.2</product> <product>ec-cube:3.0.3</product> <product>ec-cube:3.0.4</product> <product>ec-cube:3.0.5</product> <product>ec-cube:3.0.6</product> <product>ec-cube:3.0.7</product> <product>ec-cube:3.0.8</product> <product>ec-cube:3.0.9</product> </cve> <cve id="CVE-2016-4320" level="LOW"> <product>bitbucket:4.7</product> </cve> <cve id="CVE-2016-4982" level="MEDIUM"> <product>authd:-</product> </cve> <cve id="CVE-2016-4987" level="LOW"> <product>image_gallery_plugin:1.3</product> </cve> <cve id="CVE-2016-4986" level="LOW"> <product>tap_plugin:1.24</product> </cve> <cve id="CVE-2016-4329" level="LOW"> <product>anti-virus:16.0.0.614</product> <product>internet_security:16.0.0.614</product> <product>total_security:16.0.0.614</product> </cve> <cve id="CVE-2016-4984" level="MEDIUM"> <product>openldap-servers</product> </cve> <cve id="CVE-2016-3539" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3538" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3533" level="MEDIUM"> <product>knowledge_management:12.1.1</product> <product>knowledge_management:12.1.2</product> <product>knowledge_management:12.1.3</product> <product>knowledge_management:12.2.3</product> <product>knowledge_management:12.2.4</product> <product>knowledge_management:12.2.5</product> </cve> <cve id="CVE-2016-3532" level="MEDIUM"> <product>advanced_inbound_telephony:12.1.1</product> <product>advanced_inbound_telephony:12.1.2</product> <product>advanced_inbound_telephony:12.1.3</product> </cve> <cve id="CVE-2016-3531" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3530" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3537" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3536" level="MEDIUM"> <product>marketing:12.1.1</product> <product>marketing:12.1.2</product> <product>marketing:12.1.3</product> </cve> <cve id="CVE-2016-3535" level="MEDIUM"> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-3534" level="MEDIUM"> <product>installed_base:12.1.1</product> <product>installed_base:12.1.2</product> <product>installed_base:12.1.3</product> <product>installed_base:12.2.3</product> <product>installed_base:12.2.4</product> <product>installed_base:12.2.5</product> </cve> <cve id="CVE-2016-7181" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7189" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3036" level="LOW"> <product>cognos_business_intelligence:10.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-3037" level="MEDIUM"> <product>cognos_business_intelligence:10.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-6046" level="MEDIUM"> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.1</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.1</product> <product>tivoli_storage_manager:6.4.2.2</product> <product>tivoli_storage_manager:6.4.2.3</product> <product>tivoli_storage_manager:6.4.2.4</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-6515" level="LOW"> <product>openssh:7.2</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3032" level="MEDIUM"> <product>cognos_analytics:11.0.0</product> <product>cognos_analytics:11.0.1</product> <product>cognos_analytics:11.0.2</product> <product>cognos_analytics:11.0.3</product> <product>cognos_analytics:11.0.4</product> <product>cognos_analytics:11.0.5</product> <product>cognos_analytics:11.0.6</product> </cve> <cve id="CVE-2016-7986" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7987" level="LOW"> <product>eta2_firmware:11.0</product> <product>eta4_firmware:07</product> </cve> <cve id="CVE-2016-7984" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7985" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7982" level="LOW"> <product>spip:3.1.2</product> </cve> <cve id="CVE-2016-7983" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7980" level="MEDIUM"> <product>spip:3.1.2</product> </cve> <cve id="CVE-2016-7981" level="MEDIUM"> <product>spip:3.1.2</product> </cve> <cve id="CVE-2016-9589" level="LOW"> <product>jboss_wildfly_application_server:10.1.0</product> <product>jboss_wildfly_application_server:11.0.0</product> </cve> <cve id="CVE-2016-9584" level="LOW"> <product>libical:2.0</product> </cve> <cve id="CVE-2016-9585" level="HIGH"> <product>jboss_enterprise_application_platform:5.0.0</product> </cve> <cve id="CVE-2016-9586" level="MEDIUM"> <product>curl:6.0</product> <product>curl:6.1</product> <product>curl:6.1</product> <product>curl:6.2</product> <product>curl:6.3</product> <product>curl:6.3.1</product> <product>curl:6.4</product> <product>curl:6.5</product> <product>curl:6.5.1</product> <product>curl:6.5.2</product> <product>curl:7.1</product> <product>curl:7.1.1</product> <product>curl:7.2</product> <product>curl:7.2.1</product> <product>curl:7.3</product> <product>curl:7.4</product> <product>curl:7.4.1</product> <product>curl:7.4.2</product> <product>curl:7.5</product> <product>curl:7.5.1</product> <product>curl:7.5.2</product> <product>curl:7.6</product> <product>curl:7.6.1</product> <product>curl:7.7</product> <product>curl:7.7.1</product> <product>curl:7.7.2</product> <product>curl:7.7.3</product> <product>curl:7.8</product> <product>curl:7.8.1</product> <product>curl:7.9</product> <product>curl:7.9.1</product> <product>curl:7.9.2</product> <product>curl:7.9.3</product> <product>curl:7.9.4</product> <product>curl:7.9.5</product> <product>curl:7.9.6</product> <product>curl:7.9.7</product> <product>curl:7.9.8</product> <product>curl:7.10</product> <product>curl:7.10.1</product> <product>curl:7.10.2</product> <product>curl:7.10.3</product> <product>curl:7.10.4</product> <product>curl:7.10.5</product> <product>curl:7.10.6</product> <product>curl:7.10.7</product> <product>curl:7.10.8</product> <product>curl:7.11.0</product> <product>curl:7.11.1</product> <product>curl:7.11.2</product> <product>curl:7.12.0</product> <product>curl:7.12.1</product> <product>curl:7.12.2</product> <product>curl:7.12.3</product> <product>curl:7.13.0</product> <product>curl:7.13.1</product> <product>curl:7.13.2</product> <product>curl:7.14.0</product> <product>curl:7.14.1</product> <product>curl:7.15.0</product> <product>curl:7.15.1</product> <product>curl:7.15.2</product> <product>curl:7.15.3</product> <product>curl:7.15.4</product> <product>curl:7.15.5</product> <product>curl:7.16.0</product> <product>curl:7.16.1</product> <product>curl:7.16.2</product> <product>curl:7.16.3</product> <product>curl:7.16.4</product> <product>curl:7.17.0</product> <product>curl:7.17.1</product> <product>curl:7.18.0</product> <product>curl:7.18.1</product> <product>curl:7.18.2</product> <product>curl:7.19.0</product> <product>curl:7.19.1</product> <product>curl:7.19.2</product> <product>curl:7.19.3</product> <product>curl:7.19.4</product> <product>curl:7.19.5</product> <product>curl:7.19.6</product> <product>curl:7.19.7</product> <product>curl:7.20.0</product> <product>curl:7.20.1</product> <product>curl:7.21.0</product> <product>curl:7.21.1</product> <product>curl:7.21.2</product> <product>curl:7.21.3</product> <product>curl:7.21.4</product> <product>curl:7.21.5</product> <product>curl:7.21.6</product> <product>curl:7.21.7</product> <product>curl:7.22.0</product> <product>curl:7.23.0</product> <product>curl:7.23.1</product> <product>curl:7.24.0</product> <product>curl:7.25.0</product> <product>curl:7.26.0</product> <product>curl:7.27.0</product> <product>curl:7.28.0</product> <product>curl:7.28.1</product> <product>curl:7.29.0</product> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> <product>curl:7.51.0</product> </cve> <cve id="CVE-2016-9587" level="MEDIUM"> <product>openstack:11.0</product> </cve> <cve id="CVE-2016-5056" level="LOW"> <product>lightify_pro:-</product> </cve> <cve id="CVE-2016-5057" level="LOW"> <product>lightify_pro:-</product> </cve> <cve id="CVE-2016-5054" level="LOW"> <product>lightify_home:1.6.1</product> </cve> <cve id="CVE-2016-5055" level="MEDIUM"> <product>lightify_pro:-</product> </cve> <cve id="CVE-2016-5052" level="LOW"> <product>lightify_home:1.6.1</product> </cve> <cve id="CVE-2016-5053" level="LOW"> <product>lightify_home:1.6.1</product> </cve> <cve id="CVE-2016-5050" level="LOW"> <product>readydesk:9.1</product> </cve> <cve id="CVE-2016-5051" level="LOW"> <product>lightify_home:1.6.1</product> </cve> <cve id="CVE-2016-3039" level="LOW"> <product>traveler:8.5.3</product> <product>traveler:9.0</product> <product>traveler:9.0.1</product> </cve> <cve id="CVE-2016-5058" level="LOW"> <product>lightify_pro:-</product> </cve> <cve id="CVE-2016-5059" level="LOW"> <product>lightify_pro:-</product> </cve> <cve id="CVE-2016-5588" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-5589" level="LOW"> <product>customer_relationship_management_technical_foundation:12.1.1</product> <product>customer_relationship_management_technical_foundation:12.1.2</product> <product>customer_relationship_management_technical_foundation:12.1.3</product> <product>customer_relationship_management_technical_foundation:12.2.3</product> <product>customer_relationship_management_technical_foundation:12.2.4</product> <product>customer_relationship_management_technical_foundation:12.2.5</product> <product>customer_relationship_management_technical_foundation:12.2.6</product> </cve> <cve id="CVE-2016-5585" level="LOW"> <product>interaction_center_intelligence:12.1.1</product> <product>interaction_center_intelligence:12.1.2</product> <product>interaction_center_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-5586" level="LOW"> <product>email_center:12.1.1</product> <product>email_center:12.1.2</product> <product>email_center:12.1.3</product> <product>email_center:12.2.3</product> <product>email_center:12.2.4</product> <product>email_center:12.2.5</product> <product>email_center:12.2.6</product> </cve> <cve id="CVE-2016-5587" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> </cve> <cve id="CVE-2016-5580" level="LOW"> <product>secure_global_desktop:4.7</product> <product>secure_global_desktop:5.2</product> </cve> <cve id="CVE-2016-5581" level="LOW"> <product>irecruitment:12.1.1</product> <product>irecruitment:12.1.2</product> <product>irecruitment:12.1.3</product> <product>irecruitment:12.2.3</product> <product>irecruitment:12.2.4</product> <product>irecruitment:12.2.5</product> <product>irecruitment:12.2.6</product> </cve> <cve id="CVE-2016-5582" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5583" level="LOW"> <product>one-to-one_fulfillment:12.1.1</product> <product>one-to-one_fulfillment:12.1.2</product> <product>one-to-one_fulfillment:12.1.3</product> <product>one-to-one_fulfillment:12.2.3</product> <product>one-to-one_fulfillment:12.2.4</product> <product>one-to-one_fulfillment:12.2.5</product> <product>one-to-one_fulfillment:12.2.6</product> </cve> <cve id="CVE-2016-7964" level="MEDIUM"> <product>dokuwiki:2016-06-26a</product> </cve> <cve id="CVE-2016-7965" level="MEDIUM"> <product>dokuwiki:2016-06-26a</product> </cve> <cve id="CVE-2016-2050" level="MEDIUM"> <product>libdwarf:20151114</product> </cve> <cve id="CVE-2016-7967" level="MEDIUM"> <product>kmail:5.3.0</product> </cve> <cve id="CVE-2016-6800" level="MEDIUM"> <product>ofbiz:11.04</product> <product>ofbiz:11.04.01</product> <product>ofbiz:11.04.02</product> <product>ofbiz:11.04.03</product> <product>ofbiz:11.04.04</product> <product>ofbiz:11.04.05</product> <product>ofbiz:11.04.06</product> <product>ofbiz:12.04</product> <product>ofbiz:12.04.01</product> <product>ofbiz:12.04.02</product> <product>ofbiz:12.04.03</product> <product>ofbiz:12.04.04</product> <product>ofbiz:12.04.05</product> <product>ofbiz:12.04.06</product> <product>ofbiz:13.07</product> <product>ofbiz:13.07.01</product> <product>ofbiz:13.07.02</product> <product>ofbiz:13.07.03</product> </cve> <cve id="CVE-2016-6802" level="LOW"> <product>shiro:1.3.1</product> </cve> <cve id="CVE-2016-6803" level="MEDIUM"> <product>openoffice:4.1.2</product> </cve> <cve id="CVE-2016-6804" level="MEDIUM"> <product>openoffice:4.1.2</product> </cve> <cve id="CVE-2016-6805" level="MEDIUM"> <product>ignite:1.8</product> </cve> <cve id="CVE-2016-6806" level="MEDIUM"> <product>wicket:6.20.0</product> <product>wicket:6.21.0</product> <product>wicket:6.22.0</product> <product>wicket:6.23.0</product> <product>wicket:6.24.0</product> <product>wicket:7.0.0</product> <product>wicket:7.1.0</product> <product>wicket:7.2.0</product> <product>wicket:7.3.0</product> <product>wicket:7.4.0</product> <product>wicket:8.0.0</product> </cve> <cve id="CVE-2016-6807" level="LOW"> <product>ambari:2.4.0</product> <product>ambari:2.4.1</product> </cve> <cve id="CVE-2016-6809" level="LOW"> <product>tika:1.13</product> </cve> <cve id="CVE-2016-7968" level="LOW"> <product>kmail:5.3.0</product> </cve> <cve id="CVE-2016-6112" level="LOW"> <product>distributed_marketing:8.6.0.0</product> <product>distributed_marketing:9.0.0.0</product> <product>distributed_marketing:9.1.0.0</product> <product>distributed_marketing:10.0.0.0</product> <product>marketing_operations:8.6.0.0</product> <product>marketing_operations:9.0.0.0</product> <product>marketing_operations:9.1.0.0</product> <product>marketing_operations:10.0.0.0</product> <product>marketing_platform:8.6.0.0</product> <product>marketing_platform:9.0.0.0</product> <product>marketing_platform:9.1.0.0</product> <product>marketing_platform:9.1.2.0</product> <product>marketing_platform:10.0</product> </cve> <cve id="CVE-2016-6113" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-6110" level="LOW"> <product>tivoli_storage_manager:7.1.0.0</product> <product>tivoli_storage_manager:7.1.6.3</product> <product>your_sha256_hashfor_vmware:7.1.0.0</product> <product>your_sha256_hashfor_vmware:7.1.6.3</product> </cve> <cve id="CVE-2016-6111" level="LOW"> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0.0</product> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:7.0.0.0</product> </cve> <cve id="CVE-2016-6116" level="MEDIUM"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6117" level="LOW"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6114" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-6115" level="LOW"> <product>general_parallel_file_system:4.1.0.0</product> <product>general_parallel_file_system:4.1.0.1</product> <product>general_parallel_file_system:4.1.0.2</product> <product>general_parallel_file_system:4.1.0.3</product> <product>general_parallel_file_system:4.1.0.4</product> <product>general_parallel_file_system:4.1.0.5</product> <product>general_parallel_file_system:4.1.0.6</product> <product>general_parallel_file_system:4.1.0.7</product> <product>general_parallel_file_system:4.1.0.8</product> <product>spectrum_scale:4.1.0.0</product> <product>spectrum_scale:4.1.1.0</product> <product>spectrum_scale:4.1.1.1</product> <product>spectrum_scale:4.1.1.2</product> <product>spectrum_scale:4.1.1.3</product> <product>spectrum_scale:4.1.1.4</product> <product>spectrum_scale:4.1.1.5</product> <product>spectrum_scale:4.1.1.6</product> <product>spectrum_scale:4.1.1.7</product> <product>spectrum_scale:4.1.1.8</product> <product>spectrum_scale:4.1.1.9</product> <product>spectrum_scale:4.1.1.10</product> <product>spectrum_scale:4.2.0.0</product> <product>spectrum_scale:4.2.0.1</product> <product>spectrum_scale:4.2.0.2</product> <product>spectrum_scale:4.2.0.3</product> <product>spectrum_scale:4.2.1</product> <product>spectrum_scale:4.2.2.0</product> </cve> <cve id="CVE-2016-6118" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> <product>emptoris_strategic_supply_management:10.1.1.11</product> </cve> <cve id="CVE-2016-4383" level="MEDIUM"> <product>helion_openstack_glance:-</product> </cve> <cve id="CVE-2016-4382" level="MEDIUM"> <product>performance_center:11.52</product> <product>performance_center:12.00</product> <product>performance_center:12.01</product> <product>performance_center:12.20</product> <product>performance_center:12.50</product> </cve> <cve id="CVE-2016-6544" level="LOW"> <product>itrack_easy:-</product> </cve> <cve id="CVE-2016-4389" level="MEDIUM"> <product>keyview:10.18.0.0</product> <product>keyview:10.19.0.0</product> <product>keyview:10.20.0.0</product> <product>keyview:10.21.0.0</product> <product>keyview:10.22.0.0</product> <product>keyview:10.23.0.0</product> <product>keyview:10.24.0.0</product> </cve> <cve id="CVE-2016-4388" level="MEDIUM"> <product>keyview:10.18.0.0</product> <product>keyview:10.19.0.0</product> <product>keyview:10.20.0.0</product> <product>keyview:10.21.0.0</product> <product>keyview:10.22.0.0</product> <product>keyview:10.23.0.0</product> <product>keyview:10.24.0.0</product> </cve> <cve id="CVE-2016-0349" level="LOW"> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.7.0</product> </cve> <cve id="CVE-2016-0348" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.4.0.0</product> </cve> <cve id="CVE-2016-0341" level="LOW"> <product>b2b_advanced_communications:1.0</product> <product>b2b_advanced_communications:1.0.0.1</product> <product>b2b_advanced_communications:1.0.0.2</product> <product>b2b_advanced_communications:1.0.0.3</product> <product>multi-enterprise_integration_gateway:1.0.0</product> </cve> <cve id="CVE-2016-0340" level="MEDIUM"> <product>security_identity_manager_adapter:7.0.0.0</product> <product>security_identity_manager_adapter:7.0.0.1</product> <product>security_identity_manager_adapter:7.0.0.2</product> <product>security_identity_manager_adapter:7.0.0.3</product> <product>security_identity_manager_adapter:7.0.1.0</product> <product>security_identity_manager_adapter:7.0.1.1</product> </cve> <cve id="CVE-2016-0343" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-0342" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-0345" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-0344" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-0346" level="MEDIUM"> <product>cognos_business_intelligence:10.1.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.1</product> <product>cognos_business_intelligence:10.2.1.1</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-9979" level="MEDIUM"> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:7.0.0.0</product> </cve> <cve id="CVE-2016-9978" level="LOW"> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0.0</product> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:7.0.0.0</product> </cve> <cve id="CVE-2016-9973" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_doors_next_generation:6.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.3</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.3</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9972" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.3.0</product> <product>qradar_security_information_and_event_manager:7.3.0</product> </cve> <cve id="CVE-2016-9975" level="MEDIUM"> <product>dashboard_application_services_hub:3.1.2.1</product> <product>dashboard_application_services_hub:3.1.3</product> </cve> <cve id="CVE-2016-9977" level="LOW"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> <product>maximo_asset_management_essentials:7.1</product> <product>maximo_asset_management_essentials:7.5</product> </cve> <cve id="CVE-2016-9976" level="MEDIUM"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> <product>maximo_asset_management_essentials:7.1</product> <product>maximo_asset_management_essentials:7.5</product> </cve> <cve id="CVE-2016-10228" level="MEDIUM"> <product>glibc:2.25</product> </cve> <cve id="CVE-2016-10223" level="MEDIUM"> <product>bigtree_cms:4.2.14</product> </cve> <cve id="CVE-2016-10220" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-10221" level="MEDIUM"> <product>mupdf:1.10a</product> </cve> <cve id="CVE-2016-10227" level="LOW"> <product>nwa3560-n_firmware:-</product> <product>usg50_firmware:-</product> </cve> <cve id="CVE-2016-10224" level="LOW"> <product>novaweb_web_hmi</product> </cve> <cve id="CVE-2016-9399" level="LOW"> <product>jasper:1.900.22</product> </cve> <cve id="CVE-2016-9395" level="MEDIUM"> <product>jasper:1.900.24</product> </cve> <cve id="CVE-2016-9394" level="MEDIUM"> <product>jasper:1.900.16</product> </cve> <cve id="CVE-2016-9397" level="LOW"> <product>jasper:1.900.13</product> </cve> <cve id="CVE-2016-9396" level="LOW"> <product>jasper:1.900.11</product> </cve> <cve id="CVE-2016-9391" level="LOW"> <product>jasper:2.0.6</product> </cve> <cve id="CVE-2016-9390" level="MEDIUM"> <product>jasper:1.900.13</product> </cve> <cve id="CVE-2016-9393" level="MEDIUM"> <product>jasper:1.900.17</product> </cve> <cve id="CVE-2016-9392" level="MEDIUM"> <product>jasper:1.900.16</product> </cve> <cve id="CVE-2016-4518" level="LOW"> <product>pi_af_server_2016:2.7.0</product> </cve> <cve id="CVE-2016-4519" level="LOW"> <product>visilogic_oplc_ide:9.8.22</product> </cve> <cve id="CVE-2016-4048" level="MEDIUM"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-4049" level="LOW"> <product>quagga:-</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-4046" level="LOW"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-4511" level="MEDIUM"> <product>pcm600:2.6</product> </cve> <cve id="CVE-2016-4512" level="LOW"> <product>elcsoft:2.4.01</product> </cve> <cve id="CVE-2016-4045" level="MEDIUM"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-4514" level="HIGH"> <product>pt-7728_firmware:3.4</product> <product>pt-7728:-</product> </cve> <cve id="CVE-2016-4043" level="MEDIUM"> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-4516" level="LOW"> <product>pcm600:2.6</product> </cve> <cve id="CVE-2016-4041" level="LOW"> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> </cve> <cve id="CVE-2016-8378" level="LOW"> <product>jenesys_bas_bridge:1.1.8</product> </cve> <cve id="CVE-2016-8379" level="MEDIUM"> <product>e1200_series_firmware:2.3</product> <product>e1200_series_firmware:2.4</product> <product>e1200_series_firmware:2.5</product> <product>e2200_series_firmware:3.11</product> <product>e2200_series_firmware:3.12</product> <product>e2200_series_firmware:3.13</product> </cve> <cve id="CVE-2016-8370" level="LOW"> <product>qj71e71-100_firmware:-</product> <product>qj71e71-b2_firmware:-</product> <product>qj71e71-b5_firmware:-</product> </cve> <cve id="CVE-2016-8371" level="LOW"> <product>ilc_plcs_firmware:-</product> </cve> <cve id="CVE-2016-8372" level="MEDIUM"> <product>e1200_series_firmware:2.3</product> <product>e1200_series_firmware:2.4</product> <product>e1200_series_firmware:2.5</product> <product>e2200_series_firmware:3.11</product> <product>e2200_series_firmware:3.12</product> <product>e2200_series_firmware:3.13</product> </cve> <cve id="CVE-2016-8374" level="LOW"> <product>magelis_gto_advanced_optimum_panel_firmware:-</product> <product>magelis_gtu_universal_panel_firmware:-</product> <product>magelis_sto5_small_panel_firmware:-</product> <product>magelis_stu_small_panel_firmware:-</product> <product>magelis_xbt_gh_advanced_hand-held_panel_firmware:-</product> <product>your_sha256_hash:-</product> <product>magelis_xbt_gt_advanced_touchscreen_panel_firmware:-</product> <product>magelis_xbt_gtw_advanced_open_touchscreen_panel_firmware:-</product> </cve> <cve id="CVE-2016-8375" level="MEDIUM"> <product>alaris_8015_pc_unit:9.5</product> <product>alaris_8015_pc_unit:9.7</product> </cve> <cve id="CVE-2016-8376" level="MEDIUM"> <product>webdatorcentral:-</product> </cve> <cve id="CVE-2016-8377" level="MEDIUM"> <product>plc_winproladder_firmware:3.11</product> </cve> <cve id="CVE-2016-2917" level="LOW"> <product>tririga_application_platform:10.4</product> <product>tririga_application_platform:10.5</product> </cve> <cve id="CVE-2016-2914" level="LOW"> <product>rational_publishing_engine:2.0.1</product> </cve> <cve id="CVE-2016-9028" level="MEDIUM"> <product>netscaler_application_delivery_controller_firmware:10.1</product> <product>netscaler_application_delivery_controller_firmware:10.5</product> <product>netscaler_application_delivery_controller_firmware:11.0</product> <product>netscaler_application_delivery_controller_firmware:11.1</product> </cve> <cve id="CVE-2016-2912" level="MEDIUM"> <product>rational_publishing_engine:2.0.1</product> </cve> <cve id="CVE-2016-2268" level="MEDIUM"> <product>secureworks:2.0.6</product> </cve> <cve id="CVE-2016-9020" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-5648" level="MEDIUM"> <product>acer_portal:3.9.3.2006</product> </cve> <cve id="CVE-2016-5642" level="MEDIUM"> <product>network_management_information_system:8.5.10g</product> </cve> <cve id="CVE-2016-5640" level="LOW"> <product>airmedia_am-100_firmware:1.2.1</product> </cve> <cve id="CVE-2016-5647" level="LOW"> <product>graphics_driver:15.33.42.4358</product> <product>graphics_driver:15.36.30.4385</product> <product>graphics_driver:15.40.4404</product> </cve> <cve id="CVE-2016-5646" level="MEDIUM"> <product>perceptive_document_filters:11.2.0.1732</product> </cve> <cve id="CVE-2016-5645" level="LOW"> <product>1766-l32awa:-</product> <product>1766-l32awaa:-</product> <product>1766-l32bwa:-</product> <product>1766-l32bwaa:-</product> <product>1766-l32bxb:-</product> <product>1766-l32bxba:-</product> </cve> <cve id="CVE-2016-7933" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0212" level="LOW"> <product>tivoli_storage_manager_fastback:5.5.0</product> <product>tivoli_storage_manager_fastback:6.1.0</product> <product>tivoli_storage_manager_fastback:6.1.0.0</product> <product>tivoli_storage_manager_fastback:6.1.0.1</product> <product>tivoli_storage_manager_fastback:6.1.1</product> <product>tivoli_storage_manager_fastback:6.1.1.0</product> <product>tivoli_storage_manager_fastback:6.1.2</product> <product>tivoli_storage_manager_fastback:6.1.2.0</product> <product>tivoli_storage_manager_fastback:6.1.3</product> <product>tivoli_storage_manager_fastback:6.1.3.0</product> <product>tivoli_storage_manager_fastback:6.1.4</product> <product>tivoli_storage_manager_fastback:6.1.4.0</product> <product>tivoli_storage_manager_fastback:6.1.5</product> <product>tivoli_storage_manager_fastback:6.1.5.0</product> <product>tivoli_storage_manager_fastback:6.1.5.2</product> <product>tivoli_storage_manager_fastback:6.1.6</product> <product>tivoli_storage_manager_fastback:6.1.6.0</product> <product>tivoli_storage_manager_fastback:6.1.6.1</product> <product>tivoli_storage_manager_fastback:6.1.6.2</product> <product>tivoli_storage_manager_fastback:6.1.7</product> <product>tivoli_storage_manager_fastback:6.1.7.0</product> <product>tivoli_storage_manager_fastback:6.1.7.1</product> <product>tivoli_storage_manager_fastback:6.1.7.2</product> <product>tivoli_storage_manager_fastback:6.1.8</product> <product>tivoli_storage_manager_fastback:6.1.8.0</product> <product>tivoli_storage_manager_fastback:6.1.8.1</product> <product>tivoli_storage_manager_fastback:6.1.9</product> <product>tivoli_storage_manager_fastback:6.1.9.0</product> <product>tivoli_storage_manager_fastback:6.1.9.1</product> <product>tivoli_storage_manager_fastback:6.1.10</product> <product>tivoli_storage_manager_fastback:6.1.10.0</product> <product>tivoli_storage_manager_fastback:6.1.10.1</product> <product>tivoli_storage_manager_fastback:6.1.11</product> <product>tivoli_storage_manager_fastback:6.1.11.0</product> <product>tivoli_storage_manager_fastback:6.1.11.1</product> </cve> <cve id="CVE-2016-7931" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7930" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0217" level="MEDIUM"> <product>cognos_analytics:11.0.0.0</product> <product>cognos_analytics:11.0.1.0</product> <product>cognos_analytics:11.0.2.0</product> <product>cognos_analytics:11.0.3.0</product> <product>cognos_analytics:11.0.4.0</product> </cve> <cve id="CVE-2016-7936" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7935" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0214" level="MEDIUM"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-7939" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-6347" level="MEDIUM"> <product>resteasy:-</product> </cve> <cve id="CVE-2016-6346" level="LOW"> <product>resteasy:-</product> </cve> <cve id="CVE-2016-6345" level="LOW"> <product>resteasy:-</product> </cve> <cve id="CVE-2016-0218" level="MEDIUM"> <product>cognos_business_intelligence:10.1.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.1</product> <product>cognos_business_intelligence:10.2.1.1</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-6342" level="LOW"> <product>elog:3.1.1</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-6341" level="LOW"> <product>ovirt:4.0.2</product> </cve> <cve id="CVE-2016-6340" level="LOW"> <product>quickstart_cloud_installer:-</product> </cve> <cve id="CVE-2016-6349" level="LOW"> <product>oci-register-machine:-</product> </cve> <cve id="CVE-2016-6348" level="MEDIUM"> <product>resteasy:-</product> </cve> <cve id="CVE-2016-3734" level="MEDIUM"> <product>moodle:2.7</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.7.13</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:3.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> </cve> <cve id="CVE-2016-3737" level="LOW"> <product>jboss_operations_network:3.3.5</product> </cve> <cve id="CVE-2016-3088" level="LOW"> <product>activemq:5.13.3</product> </cve> <cve id="CVE-2016-3731" level="LOW"> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:3.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> </cve> <cve id="CVE-2016-3733" level="LOW"> <product>moodle:2.7</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.7.13</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:3.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> </cve> <cve id="CVE-2016-3732" level="LOW"> <product>moodle:2.7</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.7.13</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:3.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> </cve> <cve id="CVE-2016-3083" level="LOW"> <product>hive:0.13.0</product> <product>hive:0.13.1</product> <product>hive:0.14.0</product> <product>hive:1.0.0</product> <product>hive:1.0.1</product> <product>hive:1.1.0</product> <product>hive:1.1.1</product> <product>hive:1.2.0</product> <product>hive:1.2.1</product> </cve> <cve id="CVE-2016-3082" level="LOW"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.12</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.28</product> </cve> <cve id="CVE-2016-3081" level="MEDIUM"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.12</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.28</product> <product>siebel_e-billing:7.1</product> </cve> <cve id="CVE-2016-3080" level="MEDIUM"> <product>network_satellite:5.7</product> </cve> <cve id="CVE-2016-3739" level="HIGH"> <product>curl:7.21.0</product> <product>curl:7.21.1</product> <product>curl:7.21.2</product> <product>curl:7.21.3</product> <product>curl:7.21.4</product> <product>curl:7.21.5</product> <product>curl:7.21.6</product> <product>curl:7.21.7</product> <product>curl:7.22.0</product> <product>curl:7.23.0</product> <product>curl:7.23.1</product> <product>curl:7.24.0</product> <product>curl:7.25.0</product> <product>curl:7.26.0</product> <product>curl:7.27.0</product> <product>curl:7.28.0</product> <product>curl:7.28.1</product> <product>curl:7.29.0</product> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.48.0</product> </cve> <cve id="CVE-2016-3738" level="LOW"> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-3085" level="MEDIUM"> <product>cloudstack:4.5.1</product> <product>cloudstack:4.5.2</product> <product>cloudstack:4.6.0</product> <product>cloudstack:4.6.1</product> <product>cloudstack:4.6.2</product> <product>cloudstack:4.7.0</product> <product>cloudstack:4.8</product> </cve> <cve id="CVE-2016-3084" level="MEDIUM"> <product>cloud_foundry:236</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_uaa:3.3.0</product> <product>cloud_foundry_uaa_release:10</product> <product>login-server:-</product> </cve> <cve id="CVE-2016-8964" level="LOW"> <product>bigfix_inventory:9.2</product> </cve> <cve id="CVE-2016-8967" level="LOW"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8966" level="MEDIUM"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8961" level="MEDIUM"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8960" level="LOW"> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.1</product> <product>cognos_business_intelligence:10.2.1.1</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-8963" level="LOW"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8962" level="MEDIUM"> <product>bigfix_inventory:9.2</product> </cve> <cve id="CVE-2016-8968" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> </cve> <cve id="CVE-2016-0420" level="LOW"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-7437" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-0422" level="MEDIUM"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-7435" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-0424" level="MEDIUM"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-0425" level="MEDIUM"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-0427" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.4.0.2</product> <product>enterprise_manager_grid_control:12.5.0.2</product> </cve> <cve id="CVE-2016-0429" level="MEDIUM"> <product>fusion_middleware:11.1.1.7.0</product> <product>fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-7438" level="LOW"> <product>wolfssl:3.9.8</product> </cve> <cve id="CVE-2016-7439" level="LOW"> <product>wolfssl:3.9.8</product> </cve> <cve id="CVE-2016-3553" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3552" level="HIGH"> <product>jdk:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-3555" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3554" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3557" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3556" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3559" level="MEDIUM"> <product>email_center:12.1.1</product> <product>email_center:12.1.2</product> <product>email_center:12.1.3</product> <product>email_center:12.2.3</product> <product>email_center:12.2.4</product> <product>email_center:12.2.5</product> </cve> <cve id="CVE-2016-3558" level="MEDIUM"> <product>email_center:12.1.1</product> <product>email_center:12.1.2</product> <product>email_center:12.1.3</product> <product>email_center:12.2.3</product> <product>email_center:12.2.4</product> <product>email_center:12.2.5</product> </cve> <cve id="CVE-2016-10198" level="MEDIUM"> <product>gstreamer:1.10.2</product> </cve> <cve id="CVE-2016-10199" level="LOW"> <product>gstreamer:1.10.2</product> </cve> <cve id="CVE-2016-4592" level="MEDIUM"> <product>webkit</product> </cve> <cve id="CVE-2016-0284" level="LOW"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-0285" level="MEDIUM"> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-0286" level="LOW"> <product>tivoli_business_service_manager:6.1.0</product> <product>tivoli_business_service_manager:6.1.1</product> </cve> <cve id="CVE-2016-0287" level="LOW"> <product>i_access:7.1</product> </cve> <cve id="CVE-2016-0280" level="MEDIUM"> <product>information_server_framework:8.5</product> <product>information_server_framework:8.7</product> <product>information_server_framework:9.1</product> <product>information_server_framework:11.3</product> <product>information_server_framework:11.5</product> <product>infosphere_information_governance_catalog:11.3</product> <product>infosphere_information_governance_catalog:11.5</product> <product>infosphere_information_server_business_glossary:8.7</product> <product>infosphere_information_server_business_glossary:9.1</product> </cve> <cve id="CVE-2016-0281" level="MEDIUM"> <product>vios:2.2.0.10</product> <product>vios:2.2.0.11</product> <product>vios:2.2.0.12</product> <product>vios:2.2.0.13</product> <product>vios:2.2.1.0</product> <product>vios:2.2.1.1</product> <product>vios:2.2.1.3</product> <product>aix:5.3</product> <product>aix:6.1</product> <product>aix:7.1</product> <product>aix:7.2</product> <product>vios:2.2.0.10</product> <product>vios:2.2.0.11</product> <product>vios:2.2.0.12</product> <product>vios:2.2.0.13</product> <product>vios:2.2.1.0</product> <product>vios:2.2.1.1</product> <product>vios:2.2.1.3</product> <product>vios:2.2.1.4</product> <product>vios:2.2.1.5</product> <product>vios:2.2.1.6</product> <product>vios:2.2.1.7</product> <product>vios:2.2.1.8</product> <product>vios:2.2.1.9</product> <product>vios:2.2.2.0</product> <product>vios:2.2.2.1</product> <product>vios:2.2.2.2</product> <product>vios:2.2.2.3</product> <product>vios:2.2.2.4</product> <product>vios:2.2.2.5</product> <product>vios:2.2.3.0</product> <product>vios:2.2.3.1</product> <product>vios:2.2.3.2</product> <product>vios:2.2.3.3</product> <product>vios:2.2.3.4</product> </cve> <cve id="CVE-2016-0282" level="MEDIUM"> <product>lotus_inotes:8.5.0.0</product> <product>lotus_inotes:8.5.0.1</product> <product>lotus_inotes:8.5.1.0</product> <product>lotus_inotes:8.5.1.1</product> <product>lotus_inotes:8.5.1.2</product> <product>lotus_inotes:8.5.1.3</product> <product>lotus_inotes:8.5.1.4</product> <product>lotus_inotes:8.5.1.5</product> <product>lotus_inotes:8.5.2.0</product> <product>lotus_inotes:8.5.2.1</product> <product>lotus_inotes:8.5.2.2</product> <product>lotus_inotes:8.5.2.3</product> <product>lotus_inotes:8.5.2.4</product> <product>lotus_inotes:8.5.3.0</product> <product>lotus_inotes:8.5.3.1</product> <product>lotus_inotes:8.5.3.2</product> <product>lotus_inotes:8.5.3.3</product> <product>lotus_inotes:8.5.3.4</product> <product>lotus_inotes:8.5.3.5</product> <product>lotus_inotes:8.5.3.6</product> </cve> <cve id="CVE-2016-0283" level="MEDIUM"> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> </cve> <cve id="CVE-2016-0288" level="LOW"> <product>security_appscan:8.7.0.0</product> <product>security_appscan:8.7.0.1</product> <product>security_appscan:8.8.0.0</product> <product>security_appscan:9.0.0.0</product> <product>security_appscan:9.0.0.1</product> <product>security_appscan:9.0.1.0</product> <product>security_appscan:9.0.1.1</product> <product>security_appscan:9.0.2.0</product> <product>security_appscan:9.0.2.1</product> <product>security_appscan:9.0.3.0</product> <product>security_appscan:9.0.3.1</product> </cve> <cve id="CVE-2016-0289" level="LOW"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.6</product> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> </cve> <cve id="CVE-2016-9566" level="LOW"> <product>nagios:4.2.3</product> </cve> <cve id="CVE-2016-9567" level="MEDIUM"> <product>samsung_mobile:6.0</product> </cve> <cve id="CVE-2016-9564" level="LOW"> <product>boa:0.92r</product> </cve> <cve id="CVE-2016-9565" level="LOW"> <product>nagios:4.2.1</product> </cve> <cve id="CVE-2016-9562" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-9563" level="MEDIUM"> <product>netweaver:7.50</product> </cve> <cve id="CVE-2016-9560" level="MEDIUM"> <product>jasper:1.900.22</product> </cve> <cve id="CVE-2016-9568" level="LOW"> <product>carbon_black:5.1.1.60603</product> </cve> <cve id="CVE-2016-9569" level="LOW"> <product>carbon_black:5.1.1.60603</product> </cve> <cve id="CVE-2016-5078" level="MEDIUM"> <product>prtg:16.2.24.3791</product> </cve> <cve id="CVE-2016-5074" level="LOW"> <product>cloudview_nms:2.09b</product> </cve> <cve id="CVE-2016-5075" level="MEDIUM"> <product>cloudview_nms:2.09b</product> </cve> <cve id="CVE-2016-5076" level="LOW"> <product>cloudview_nms:2.09b</product> </cve> <cve id="CVE-2016-5077" level="MEDIUM"> <product>eventsentry:3.2.1.8</product> <product>eventsentry:3.2.1.22</product> <product>eventsentry:3.2.1.30</product> </cve> <cve id="CVE-2016-5070" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5071" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5072" level="LOW"> <product>oxid_eshop:4.9.8</product> <product>oxid_eshop:4.9.8</product> <product>oxid_eshop:5.2.8</product> </cve> <cve id="CVE-2016-5073" level="MEDIUM"> <product>cloudview_nms:2.09b</product> </cve> <cve id="CVE-2016-1489" level="MEDIUM"> <product>shareit:2.5.1.1</product> <product>shareit:3.0.18_ww</product> </cve> <cve id="CVE-2016-1488" level="MEDIUM"> <product>ozw672_firmware:5.2</product> <product>ozw772_firmware:5.2</product> </cve> <cve id="CVE-2016-9700" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_doors_next_generation:6.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.3</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.3</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9701" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9706" level="LOW"> <product>integration_bus:9.0</product> <product>integration_bus:10.0</product> <product>websphere_message_broker:8.0</product> </cve> <cve id="CVE-2016-9707" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_doors_next_generation:6.0.3</product> <product>rational_engineering_lifecycle_manager:4.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.3</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.3</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9704" level="MEDIUM"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> <product>security_identity_manager_virtual_appliance:7.0.1.1</product> <product>security_identity_manager_virtual_appliance:7.0.1.2</product> <product>security_identity_manager_virtual_appliance:7.0.1.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.4</product> </cve> <cve id="CVE-2016-1481" level="LOW"> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.1.1-000</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> </cve> <cve id="CVE-2016-1480" level="LOW"> <product>email_security_appliance:8.0.1-023</product> <product>email_security_appliance:8.0_base</product> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.1.1-000</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.7.0-125</product> </cve> <cve id="CVE-2016-1483" level="LOW"> <product>webex_meetings_server:2.6.0</product> </cve> <cve id="CVE-2016-1482" level="MEDIUM"> <product>webex_meetings_server:2.6.0</product> </cve> <cve id="CVE-2016-1485" level="MEDIUM"> <product>identity_services_engine_software:1.3%280.876%29</product> </cve> <cve id="CVE-2016-1484" level="LOW"> <product>webex_meetings_server:2.6.0</product> <product>webex_meetings_server:2.6.1.39</product> </cve> <cve id="CVE-2016-1486" level="LOW"> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.1.1-000</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> </cve> <cve id="CVE-2016-4705" level="LOW"> <product>xcode:7.3.1</product> </cve> <cve id="CVE-2016-4704" level="LOW"> <product>xcode:7.3.1</product> </cve> <cve id="CVE-2016-10042" level="LOW"> <product>swisscom_internet-box_firmware:-</product> </cve> <cve id="CVE-2016-10043" level="LOW"> <product>web_panel:9.0.1</product> </cve> <cve id="CVE-2016-10040" level="MEDIUM"> <product>qxmlsimplereader:4.8.5</product> </cve> <cve id="CVE-2016-10041" level="HIGH"> <product>sprecon-e_service_program:3.42</product> </cve> <cve id="CVE-2016-10510" level="MEDIUM"> <product>kohana:3.3.5</product> </cve> <cve id="CVE-2016-10047" level="MEDIUM"> <product>imagemagick:6.9.4-6</product> </cve> <cve id="CVE-2016-10045" level="LOW"> <product>phpmailer:5.2.19</product> </cve> <cve id="CVE-2016-6283" level="MEDIUM"> <product>confluence:5.10.5</product> </cve> <cve id="CVE-2016-6286" level="LOW"> <product>http-client:0.4.2</product> </cve> <cve id="CVE-2016-6287" level="LOW"> <product>http-client:0.9</product> </cve> <cve id="CVE-2016-6285" level="MEDIUM"> <product>jira:7.2.1</product> </cve> <cve id="CVE-2016-7089" level="LOW"> <product>rapidstream:-</product> </cve> <cve id="CVE-2016-7087" level="LOW"> <product>horizon_view:5.0</product> <product>horizon_view:5.0.1</product> <product>horizon_view:5.1</product> <product>horizon_view:5.1.3</product> <product>horizon_view:5.2.0</product> <product>horizon_view:5.3</product> <product>horizon_view:6.0</product> <product>horizon_view:6.0.2</product> <product>horizon_view:6.1</product> <product>horizon_view:6.1.1</product> <product>horizon_view:6.2</product> <product>horizon_view:7.0</product> </cve> <cve id="CVE-2016-7086" level="LOW"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7085" level="LOW"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7084" level="MEDIUM"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7083" level="MEDIUM"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7082" level="MEDIUM"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7081" level="MEDIUM"> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> </cve> <cve id="CVE-2016-7080" level="LOW"> <product>tools:9.0.0</product> <product>tools:9.0.1</product> <product>tools:9.0.5</product> <product>tools:9.0.10</product> <product>tools:9.0.11</product> <product>tools:9.0.12</product> <product>tools:9.0.13</product> <product>tools:9.0.15</product> <product>tools:9.0.16</product> <product>tools:9.0.17</product> <product>tools:9.4.0</product> <product>tools:9.4.5</product> <product>tools:9.4.10</product> <product>tools:9.4.11</product> <product>tools:9.4.12</product> <product>tools:9.4.15</product> <product>tools:9.10.0</product> <product>tools:9.10.1</product> <product>tools:9.10.5</product> <product>tools:10.0.0</product> <product>tools:10.0.5</product> <product>tools:10.0.6</product> <product>tools:10.0.8</product> </cve> <cve id="CVE-2016-6138" level="LOW"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-6139" level="HIGH"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-5763" level="LOW"> <product>open_enterprise_server_11:</product> <product>open_enterprise_server_11:</product> <product>open_enterprise_server_2015</product> <product>open_enterprise_server_2015:</product> </cve> <cve id="CVE-2016-6131" level="LOW"> <product>libiberty:-</product> </cve> <cve id="CVE-2016-6133" level="MEDIUM"> <product>ektron_content_management_system:9.10</product> </cve> <cve id="CVE-2016-6137" level="LOW"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-0367" level="LOW"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> <product>security_identity_manager_virtual_appliance:7.0.1.1</product> <product>security_identity_manager_virtual_appliance:7.0.1.3</product> </cve> <cve id="CVE-2016-0366" level="MEDIUM"> <product>security_privileged_identity_manager:2.0</product> </cve> <cve id="CVE-2016-0365" level="MEDIUM"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1.0</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1.0</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> </cve> <cve id="CVE-2016-7884" level="MEDIUM"> <product>experience_manager:6.1.0</product> </cve> <cve id="CVE-2016-7883" level="MEDIUM"> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-0362" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-0361" level="LOW"> <product>general_parallel_file_system:3.5</product> <product>general_parallel_file_system:3.5.0.3</product> <product>general_parallel_file_system:3.5.0.7</product> <product>general_parallel_file_system:3.5.0.9</product> <product>general_parallel_file_system:3.5.0.11</product> <product>general_parallel_file_system:3.5.0.16</product> <product>general_parallel_file_system:4.1.0.1</product> </cve> <cve id="CVE-2016-0360" level="LOW"> <product>websphere_mq_jms:7.0.1</product> <product>websphere_mq_jms:7.1</product> <product>websphere_mq_jms:7.5</product> <product>websphere_mq_jms:8.0</product> <product>websphere_mq_jms:9.0</product> </cve> <cve id="CVE-2016-7666" level="MEDIUM"> <product>transporter:1.9.1</product> </cve> <cve id="CVE-2016-0369" level="LOW"> <product>forms_experience_builder:8.5</product> <product>forms_experience_builder:8.5.1</product> <product>forms_experience_builder:8.6.0</product> </cve> <cve id="CVE-2016-7888" level="LOW"> <product>digital_editions:4.5.2</product> </cve> <cve id="CVE-2016-9955" level="HIGH"> <product>simplesamlphp:1.4.10</product> </cve> <cve id="CVE-2016-9954" level="LOW"> <product>irregex:0.9.5</product> </cve> <cve id="CVE-2016-9953" level="LOW"> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> <product>curl:7.51.0</product> </cve> <cve id="CVE-2016-9952" level="MEDIUM"> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> <product>curl:7.51.0</product> </cve> <cve id="CVE-2016-9951" level="MEDIUM"> <product>apport:2.20.3</product> </cve> <cve id="CVE-2016-10204" level="LOW"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10205" level="LOW"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10206" level="MEDIUM"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10207" level="LOW"> <product>tigervnc:0.0.90</product> <product>tigervnc:0.0.91</product> <product>tigervnc:1.0</product> <product>tigervnc:1.0.1</product> <product>tigervnc:1.1.0</product> <product>tigervnc:1.3</product> <product>tigervnc:1.3.1</product> <product>tigervnc:1.7</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-10201" level="MEDIUM"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10202" level="MEDIUM"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10203" level="MEDIUM"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10209" level="MEDIUM"> <product>libarchive:3.2.2</product> </cve> <cve id="CVE-2016-4119" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4288" level="LOW"> <product>bluestacks:2.1.3.5650</product> </cve> <cve id="CVE-2016-3948" level="LOW"> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0.stable1</product> <product>squid:3.0.stable2</product> <product>squid:3.0.stable3</product> <product>squid:3.0.stable4</product> <product>squid:3.0.stable5</product> <product>squid:3.0.stable6</product> <product>squid:3.0.stable7</product> <product>squid:3.0.stable8</product> <product>squid:3.0.stable9</product> <product>squid:3.0.stable10</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable12</product> <product>squid:3.0.stable13</product> <product>squid:3.0.stable14</product> <product>squid:3.0.stable15</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable17</product> <product>squid:3.0.stable18</product> <product>squid:3.0.stable19</product> <product>squid:3.0.stable20</product> <product>squid:3.0.stable21</product> <product>squid:3.0.stable22</product> <product>squid:3.0.stable23</product> <product>squid:3.0.stable24</product> <product>squid:3.0.stable25</product> <product>squid:3.1</product> <product>squid:3.1.0.1</product> <product>squid:3.1.0.2</product> <product>squid:3.1.0.3</product> <product>squid:3.1.0.4</product> <product>squid:3.1.0.5</product> <product>squid:3.1.0.6</product> <product>squid:3.1.0.7</product> <product>squid:3.1.0.8</product> <product>squid:3.1.0.9</product> <product>squid:3.1.0.10</product> <product>squid:3.1.0.11</product> <product>squid:3.1.0.12</product> <product>squid:3.1.0.13</product> <product>squid:3.1.0.14</product> <product>squid:3.1.0.15</product> <product>squid:3.1.0.16</product> <product>squid:3.1.0.17</product> <product>squid:3.1.0.18</product> <product>squid:3.1.1</product> <product>squid:3.1.2</product> <product>squid:3.1.3</product> <product>squid:3.1.4</product> <product>squid:3.1.5</product> <product>squid:3.1.5.1</product> <product>squid:3.1.6</product> <product>squid:3.1.7</product> <product>squid:3.1.8</product> <product>squid:3.1.9</product> <product>squid:3.1.10</product> <product>squid:3.1.11</product> <product>squid:3.1.12</product> <product>squid:3.1.13</product> <product>squid:3.1.14</product> <product>squid:3.1.15</product> <product>squid:3.2.0.1</product> <product>squid:3.2.0.2</product> <product>squid:3.2.0.3</product> <product>squid:3.2.0.4</product> <product>squid:3.2.0.5</product> <product>squid:3.2.0.6</product> <product>squid:3.2.0.7</product> <product>squid:3.2.0.8</product> <product>squid:3.2.0.9</product> <product>squid:3.2.0.10</product> <product>squid:3.2.0.11</product> <product>squid:3.2.0.12</product> <product>squid:3.2.0.13</product> <product>squid:3.2.0.14</product> <product>squid:3.2.0.15</product> <product>squid:3.2.0.16</product> <product>squid:3.2.0.17</product> <product>squid:3.2.0.18</product> <product>squid:3.2.0.19</product> <product>squid:3.2.1</product> <product>squid:3.2.2</product> <product>squid:3.2.3</product> <product>squid:3.2.4</product> <product>squid:3.2.5</product> <product>squid:3.2.6</product> <product>squid:3.2.7</product> <product>squid:3.2.8</product> <product>squid:3.2.9</product> <product>squid:3.2.10</product> <product>squid:3.2.11</product> <product>squid:3.2.12</product> <product>squid:3.2.13</product> <product>squid:3.3.0</product> <product>squid:3.3.0.2</product> <product>squid:3.3.0.3</product> <product>squid:3.3.1</product> <product>squid:3.3.2</product> <product>squid:3.3.3</product> <product>squid:3.3.4</product> <product>squid:3.3.5</product> <product>squid:3.3.6</product> <product>squid:3.3.7</product> <product>squid:3.3.8</product> <product>squid:3.3.9</product> <product>squid:3.3.10</product> <product>squid:3.3.11</product> <product>squid:3.3.12</product> <product>squid:3.3.13</product> <product>squid:3.4.0.1</product> <product>squid:3.4.0.2</product> <product>squid:3.4.0.3</product> <product>squid:3.4.1</product> <product>squid:3.4.2</product> <product>squid:3.4.3</product> <product>squid:3.4.4</product> <product>squid:3.4.8</product> <product>squid:3.4.9</product> <product>squid:3.4.10</product> <product>squid:3.4.11</product> <product>squid:3.4.12</product> <product>squid:3.4.13</product> <product>squid:3.5.0.1</product> <product>squid:3.5.0.2</product> <product>squid:3.5.0.3</product> <product>squid:3.5.0.4</product> <product>squid:3.5.1</product> <product>squid:3.5.2</product> <product>squid:3.5.3</product> <product>squid:3.5.4</product> <product>squid:3.5.5</product> <product>squid:3.5.6</product> <product>squid:3.5.7</product> <product>squid:3.5.8</product> <product>squid:3.5.9</product> <product>squid:3.5.10</product> <product>squid:3.5.11</product> <product>squid:3.5.12</product> <product>squid:3.5.13</product> <product>squid:3.5.14</product> <product>squid:3.5.15</product> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> <product>squid:4.0.7</product> </cve> <cve id="CVE-2016-3949" level="LOW"> <product>simatic_s7-300_with_profitnet_support_firmware:3.2.11</product> <product>simatic_s7-300_without_profitnet_support_firmware:3.3.11</product> </cve> <cve id="CVE-2016-3946" level="LOW"> <product>sapconsole:7.30</product> </cve> <cve id="CVE-2016-3944" level="MEDIUM"> <product>accelerator_application:-</product> </cve> <cve id="CVE-2016-3945" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> </cve> <cve id="CVE-2016-3943" level="LOW"> <product>panda_endpoint_administration_agent:7.49</product> </cve> <cve id="CVE-2016-10650" level="MEDIUM"> <product>ntfserver:0.0.18</product> </cve> <cve id="CVE-2016-4064" level="MEDIUM"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-4065" level="MEDIUM"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-4066" level="MEDIUM"> <product>fortiweb:5.5.2</product> </cve> <cve id="CVE-2016-4060" level="LOW"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-1541" level="MEDIUM"> <product>libarchive:3.1.901a</product> </cve> <cve id="CVE-2016-1542" level="LOW"> <product>bladelogic_server_automation_console:8.2.02</product> <product>bladelogic_server_automation_console:8.2.03</product> <product>bladelogic_server_automation_console:8.2.04</product> <product>bladelogic_server_automation_console:8.3.00</product> <product>bladelogic_server_automation_console:8.3.01</product> <product>bladelogic_server_automation_console:8.3.02</product> <product>bladelogic_server_automation_console:8.3.03</product> <product>bladelogic_server_automation_console:8.5.00</product> <product>bladelogic_server_automation_console:8.5.01</product> <product>bladelogic_server_automation_console:8.6.00</product> <product>bladelogic_server_automation_console:8.7.00</product> </cve> <cve id="CVE-2016-1543" level="LOW"> <product>bladelogic_server_automation_console:8.2.02</product> <product>bladelogic_server_automation_console:8.2.03</product> <product>bladelogic_server_automation_console:8.2.04</product> <product>bladelogic_server_automation_console:8.3.00</product> <product>bladelogic_server_automation_console:8.3.01</product> <product>bladelogic_server_automation_console:8.3.02</product> <product>bladelogic_server_automation_console:8.3.03</product> <product>bladelogic_server_automation_console:8.5.00</product> <product>bladelogic_server_automation_console:8.5.01</product> <product>bladelogic_server_automation_console:8.6.00</product> <product>bladelogic_server_automation_console:8.7.00</product> </cve> <cve id="CVE-2016-4068" level="MEDIUM"> <product>roundcube_webmail:1.0.8</product> <product>roundcube_webmail:1.1</product> <product>roundcube_webmail:1.1</product> <product>roundcube_webmail:1.1</product> <product>roundcube_webmail:1.1.1</product> <product>roundcube_webmail:1.1.2</product> <product>roundcube_webmail:1.1.3</product> <product>roundcube_webmail:1.1.4</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-4069" level="MEDIUM"> <product>webmail:1.1.4</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-8390" level="MEDIUM"> <product>hopper_disassembler:3.11.20</product> </cve> <cve id="CVE-2016-9043" level="MEDIUM"> <product>coreldraw:x8</product> </cve> <cve id="CVE-2016-5621" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5620" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5623" level="LOW"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-5622" level="MEDIUM"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-2512" level="MEDIUM"> <product>django:1.8.9</product> <product>django:1.9</product> <product>django:1.9.1</product> <product>django:1.9.2</product> </cve> <cve id="CVE-2016-2938" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-2939" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-2513" level="HIGH"> <product>django:1.8.9</product> <product>django:1.9</product> <product>django:1.9.1</product> <product>django:1.9.2</product> </cve> <cve id="CVE-2016-2934" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2935" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2936" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2937" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2930" level="LOW"> <product>bigfix_remote_control:9.1.3</product> </cve> <cve id="CVE-2016-2931" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2932" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2933" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2515" level="LOW"> <product>hawk:3.1.2</product> <product>hawk:4.1.0</product> </cve> <cve id="CVE-2016-3463" level="LOW"> <product>flexcube_direct_banking:12.0.3</product> </cve> <cve id="CVE-2016-1207" level="MEDIUM"> <product>wn-g300r2_firmware:1.12</product> <product>wn-g300r3_firmware:1.01</product> <product>wn-g300r_firmware:1.12</product> </cve> <cve id="CVE-2016-1206" level="LOW"> <product>wn-gdn%2fr3_firmware:-</product> </cve> <cve id="CVE-2016-1205" level="MEDIUM"> <product>category_freearea_addition:1.0</product> <product>itemdetail_freearea_addition:1.0</product> </cve> <cve id="CVE-2016-4322" level="LOW"> <product>bladelogic_server_automation_console:8.7.00</product> </cve> <cve id="CVE-2016-1200" level="LOW"> <product>ec-cube:3.0.7</product> <product>ec-cube:3.0.8</product> <product>ec-cube:3.0.9</product> </cve> <cve id="CVE-2016-4985" level="LOW"> <product>openstack_ironic:4.2.4</product> <product>openstack_ironic:5.1.0</product> <product>openstack_ironic:5.1.1</product> <product>openstack:7.0</product> <product>openstack:8.0</product> </cve> <cve id="CVE-2016-4328" level="LOW"> <product>perioperative_information_management_system:-</product> </cve> <cve id="CVE-2016-8808" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8809" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8806" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8807" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8805" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8802" level="LOW"> <product>secospace_usg6300_firmware:v500r001c20spc100</product> <product>secospace_usg6300_firmware:v500r001c20spc101</product> <product>secospace_usg6300_firmware:v500r001c20spc200</product> <product>secospace_usg6500_firmware:v500r001c20spc100</product> <product>secospace_usg6500_firmware:v500r001c20spc101</product> <product>secospace_usg6500_firmware:v500r001c20spc200</product> <product>secospace_usg6600_firmware:v500r001c20spc100</product> <product>secospace_usg6600_firmware:v500r001c20spc101</product> <product>secospace_usg6600_firmware:v500r001c20spc200</product> </cve> <cve id="CVE-2016-8803" level="MEDIUM"> <product>fusionstorage:v100r003c30u1</product> </cve> <cve id="CVE-2016-8801" level="LOW"> <product>oceanstor_5600_v3_firmware:v300r003c00c10</product> </cve> <cve id="CVE-2016-3410" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3411" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3412" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3711" level="LOW"> <product>openshift:3.2</product> <product>openshift_origin:-</product> </cve> <cve id="CVE-2016-6397" level="LOW"> <product>ip_interoperability_and_collaboration_system:4.8%281%29</product> <product>ip_interoperability_and_collaboration_system:4.8%282%29</product> <product>ip_interoperability_and_collaboration_system:4.9%281%29</product> <product>ip_interoperability_and_collaboration_system:4.9%282%29</product> <product>ip_interoperability_and_collaboration_system:4.10%281%29</product> </cve> <cve id="CVE-2016-10688" level="MEDIUM"> <product>haxe3:3.4.7</product> </cve> <cve id="CVE-2016-3414" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3415" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-8943" level="MEDIUM"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.11</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.0.0</product> <product>tivoli_storage_productivity_center:5.2.1.0</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2.0</product> <product>tivoli_storage_productivity_center:5.2.3.0</product> <product>tivoli_storage_productivity_center:5.2.4.0</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.4.1_%2b</product> <product>tivoli_storage_productivity_center:5.2.5.0</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6.0</product> <product>tivoli_storage_productivity_center:5.2.7.0</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-8942" level="MEDIUM"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.11</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.0.0</product> <product>tivoli_storage_productivity_center:5.2.1.0</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2.0</product> <product>tivoli_storage_productivity_center:5.2.3.0</product> <product>tivoli_storage_productivity_center:5.2.4.0</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.4.1_%2b</product> <product>tivoli_storage_productivity_center:5.2.5.0</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6.0</product> <product>tivoli_storage_productivity_center:5.2.7.0</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-8941" level="MEDIUM"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.11</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.0.0</product> <product>tivoli_storage_productivity_center:5.2.1.0</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2.0</product> <product>tivoli_storage_productivity_center:5.2.3.0</product> <product>tivoli_storage_productivity_center:5.2.4.0</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.5.0</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6.0</product> <product>tivoli_storage_productivity_center:5.2.7.0</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-8940" level="LOW"> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.1.0</product> <product>tivoli_storage_manager:6.1.1</product> <product>tivoli_storage_manager:6.1.2</product> <product>tivoli_storage_manager:6.1.3</product> <product>tivoli_storage_manager:6.1.4</product> <product>tivoli_storage_manager:6.1.5</product> <product>tivoli_storage_manager:6.1.5.4</product> <product>tivoli_storage_manager:6.1.5.5</product> <product>tivoli_storage_manager:6.1.5.6</product> <product>tivoli_storage_manager:6.2.0</product> <product>tivoli_storage_manager:6.2.1</product> <product>tivoli_storage_manager:6.2.2</product> <product>tivoli_storage_manager:6.2.3</product> <product>tivoli_storage_manager:6.2.4</product> <product>tivoli_storage_manager:6.3</product> <product>tivoli_storage_manager:6.3.0.5</product> <product>tivoli_storage_manager:6.3.0.15</product> <product>tivoli_storage_manager:6.3.0.17</product> <product>tivoli_storage_manager:6.3.1</product> <product>tivoli_storage_manager:6.3.1.2</product> <product>tivoli_storage_manager:6.3.2.2</product> <product>tivoli_storage_manager:6.3.3</product> <product>tivoli_storage_manager:6.3.4</product> <product>tivoli_storage_manager:6.3.5</product> <product>tivoli_storage_manager:6.3.5.1</product> <product>tivoli_storage_manager:6.3.6</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1..5.100</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.0.3</product> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> <product>tivoli_storage_manager:7.1.6</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-8947" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:9.5.0.1</product> <product>emptoris_sourcing:9.5.1.1</product> <product>emptoris_sourcing:9.5.1.2</product> <product>emptoris_sourcing:9.5.1.3</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-6420" level="LOW"> <product>firesight_system_software:4.10.3</product> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.4.0</product> </cve> <cve id="CVE-2016-8944" level="LOW"> <product>aix:7.1</product> <product>aix:7.2</product> </cve> <cve id="CVE-2016-7415" level="LOW"> <product>international_components_for_unicode:57.1</product> </cve> <cve id="CVE-2016-8949" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.2.16</product> <product>emptoris_strategic_supply_management:10.0.2.17</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.0.11</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> <product>emptoris_supplier_lifecycle_management:10.0.0.0</product> <product>emptoris_supplier_lifecycle_management:10.0.0.1</product> <product>emptoris_supplier_lifecycle_management:10.0.0.2</product> <product>emptoris_supplier_lifecycle_management:10.0.0.3</product> <product>emptoris_supplier_lifecycle_management:10.0.1.0</product> <product>emptoris_supplier_lifecycle_management:10.0.1.1</product> <product>emptoris_supplier_lifecycle_management:10.0.1.2</product> <product>emptoris_supplier_lifecycle_management:10.0.2.0</product> <product>emptoris_supplier_lifecycle_management:10.0.2.2</product> <product>emptoris_supplier_lifecycle_management:10.0.2.3</product> <product>emptoris_supplier_lifecycle_management:10.0.2.5</product> <product>emptoris_supplier_lifecycle_management:10.0.2.6</product> <product>emptoris_supplier_lifecycle_management:10.0.2.7</product> </cve> <cve id="CVE-2016-8948" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:9.5.0.1</product> <product>emptoris_sourcing:9.5.1.1</product> <product>emptoris_sourcing:9.5.1.2</product> <product>emptoris_sourcing:9.5.1.3</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-7410" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-3418" level="MEDIUM"> <product>oracle_berkeley_db:11.2.5.0.32</product> <product>oracle_berkeley_db:11.2.5.1.29</product> <product>oracle_berkeley_db:11.2.5.2.42</product> <product>oracle_berkeley_db:11.2.5.3.28</product> <product>oracle_berkeley_db:12.1.6.0.35</product> <product>oracle_berkeley_db:12.1.6.1.26</product> </cve> <cve id="CVE-2016-3579" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3578" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3577" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3576" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3575" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3574" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3573" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3572" level="LOW"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3571" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3570" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-8491" level="LOW"> <product>fortiwlc:7.0-9-1</product> <product>fortiwlc:7.0-10-0</product> <product>fortiwlc:8.1-2-0</product> <product>fortiwlc:8.1-3-2</product> <product>fortiwlc:8.2-4-0</product> </cve> <cve id="CVE-2016-8493" level="LOW"> <product>forticlient:5.4.1</product> <product>forticlient:5.4.2</product> </cve> <cve id="CVE-2016-3149" level="LOW"> <product>clickshare_csc-1_firmware:01.09.02.03</product> <product>clickshare_csm-1_firmware:01.06.01.04</product> </cve> <cve id="CVE-2016-8495" level="MEDIUM"> <product>fortimanager_firmware:5.0.3</product> <product>fortimanager_firmware:5.0.4</product> <product>fortimanager_firmware:5.0.5</product> <product>fortimanager_firmware:5.0.6</product> <product>fortimanager_firmware:5.0.7</product> <product>fortimanager_firmware:5.0.8</product> <product>fortimanager_firmware:5.0.9</product> <product>fortimanager_firmware:5.0.10</product> <product>fortimanager_firmware:5.0.11</product> <product>fortimanager_firmware:5.2.0</product> <product>fortimanager_firmware:5.2.1</product> <product>fortimanager_firmware:5.2.2</product> <product>fortimanager_firmware:5.2.3</product> <product>fortimanager_firmware:5.2.4</product> <product>fortimanager_firmware:5.2.6</product> <product>fortimanager_firmware:5.2.7</product> <product>fortimanager_firmware:5.4.0</product> <product>fortimanager_firmware:5.4.1</product> </cve> <cve id="CVE-2016-8494" level="LOW"> <product>connect:14.2</product> <product>connect:14.10</product> <product>connect:15.10</product> <product>connect:16.7</product> </cve> <cve id="CVE-2016-9540" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-1713" level="MEDIUM"> <product>vtiger_crm:6.4.0</product> </cve> <cve id="CVE-2016-1712" level="LOW"> <product>pan-os:5.0.18</product> <product>pan-os:5.1.11</product> <product>pan-os:6.0.13</product> <product>pan-os:6.1.11</product> <product>pan-os:7.0.7</product> </cve> <cve id="CVE-2016-5019" level="LOW"> <product>myfaces:1.0.0</product> <product>myfaces:1.0.1</product> <product>myfaces:1.0.2</product> <product>myfaces:1.0.3</product> <product>myfaces:1.0.4</product> <product>myfaces:1.0.5</product> <product>myfaces:1.0.6</product> <product>myfaces:1.0.7</product> <product>myfaces:1.0.8</product> <product>myfaces:1.0.9</product> <product>myfaces:1.0.10</product> <product>myfaces:1.0.11</product> <product>myfaces:1.0.12</product> <product>myfaces:1.0.13</product> <product>myfaces:1.2.1</product> <product>myfaces:1.2.2</product> <product>myfaces:1.2.3</product> <product>myfaces:1.2.4</product> <product>myfaces:1.2.5</product> <product>myfaces:1.2.6</product> <product>myfaces:1.2.7</product> <product>myfaces:1.2.8</product> <product>myfaces:1.2.9</product> <product>myfaces:1.2.10</product> <product>myfaces:1.2.11</product> <product>myfaces:1.2.12</product> <product>myfaces:1.2.13</product> <product>myfaces:1.2.14</product> <product>myfaces:2.0.0</product> <product>myfaces:2.0.1</product> <product>myfaces:2.1.0</product> <product>myfaces:2.1.1</product> </cve> <cve id="CVE-2016-5012" level="LOW"> <product>moodle:3.1.0</product> <product>moodle:3.1.0</product> <product>moodle:3.1.0</product> <product>moodle:3.1.0</product> </cve> <cve id="CVE-2016-5013" level="MEDIUM"> <product>moodle:2.7.14</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.1.0</product> </cve> <cve id="CVE-2016-5010" level="MEDIUM"> <product>imagemagick:6.9.5-2</product> </cve> <cve id="CVE-2016-8236" level="LOW"> <product>thinkserver_firmware:3.76.208</product> </cve> <cve id="CVE-2016-5016" level="MEDIUM"> <product>cloud_foundry:239</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.6.30</product> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.6.34</product> <product>cloud_foundry_elastic_runtime:1.6.35</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_uaa:3.4.1</product> <product>cloud_foundry_uaa:12.2</product> </cve> <cve id="CVE-2016-5017" level="MEDIUM"> <product>zookeeper:3.4.8</product> <product>zookeeper:3.5.0</product> <product>zookeeper:3.5.1</product> <product>zookeeper:3.5.2</product> </cve> <cve id="CVE-2016-5014" level="MEDIUM"> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.1.0</product> </cve> <cve id="CVE-2016-8232" level="MEDIUM"> <product>advanced_management_module_firmware:-</product> </cve> <cve id="CVE-2016-0005" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0002" level="HIGH"> <product>jscript:5.7</product> <product>jscript:5.8</product> <product>vbscript:5.7</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-0003" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-9728" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9729" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9720" level="LOW"> <product>qradar_incident_forensics:7.2.0</product> <product>qradar_incident_forensics:7.2.1</product> <product>qradar_incident_forensics:7.2.2</product> <product>qradar_incident_forensics:7.2.3</product> <product>qradar_incident_forensics:7.2.4</product> <product>qradar_incident_forensics:7.2.5</product> <product>qradar_incident_forensics:7.2.6</product> <product>qradar_incident_forensics:7.2.7</product> <product>qradar_incident_forensics:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9722" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.3.0</product> </cve> <cve id="CVE-2016-9723" level="MEDIUM"> <product>qradar_incident_forensics:7.2.0</product> <product>qradar_incident_forensics:7.2.1</product> <product>qradar_incident_forensics:7.2.2</product> <product>qradar_incident_forensics:7.2.3</product> <product>qradar_incident_forensics:7.2.4</product> <product>qradar_incident_forensics:7.2.5</product> <product>qradar_incident_forensics:7.2.6</product> <product>qradar_incident_forensics:7.2.7</product> <product>qradar_incident_forensics:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9724" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9725" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9726" level="LOW"> <product>qradar_incident_forensics:7.2.0</product> <product>qradar_incident_forensics:7.2.1</product> <product>qradar_incident_forensics:7.2.2</product> <product>qradar_incident_forensics:7.2.3</product> <product>qradar_incident_forensics:7.2.4</product> <product>qradar_incident_forensics:7.2.5</product> <product>qradar_incident_forensics:7.2.6</product> <product>qradar_incident_forensics:7.2.7</product> <product>qradar_incident_forensics:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9727" level="MEDIUM"> <product>qradar_incident_forensics:7.2.0</product> <product>qradar_incident_forensics:7.2.1</product> <product>qradar_incident_forensics:7.2.2</product> <product>qradar_incident_forensics:7.2.3</product> <product>qradar_incident_forensics:7.2.4</product> <product>qradar_incident_forensics:7.2.5</product> <product>qradar_incident_forensics:7.2.6</product> <product>qradar_incident_forensics:7.2.7</product> <product>qradar_incident_forensics:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-10561" level="LOW"> <product>bitty:0.2.10</product> </cve> <cve id="CVE-2016-4499" level="MEDIUM"> <product>fpwin_pro:-</product> </cve> <cve id="CVE-2016-4498" level="MEDIUM"> <product>fpwin_pro:-</product> </cve> <cve id="CVE-2016-4495" level="LOW"> <product>bac-5051e_firmware:-</product> </cve> <cve id="CVE-2016-4494" level="MEDIUM"> <product>bac-5051e_firmware:-</product> </cve> <cve id="CVE-2016-4497" level="MEDIUM"> <product>fpwin_pro:-</product> </cve> <cve id="CVE-2016-4496" level="MEDIUM"> <product>fpwin_pro:-</product> </cve> <cve id="CVE-2016-4491" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4490" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4493" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4492" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-2542" level="LOW"> <product>installshield:2015</product> </cve> <cve id="CVE-2016-2894" level="LOW"> <product>tivoli_storage_manager:5.5</product> <product>tivoli_storage_manager:5.5.0</product> <product>tivoli_storage_manager:5.5.2</product> <product>tivoli_storage_manager:5.5.3</product> <product>tivoli_storage_manager:5.5.4</product> <product>tivoli_storage_manager:5.5.4.1</product> <product>tivoli_storage_manager:5.5.4.2</product> <product>tivoli_storage_manager:5.5.4.3</product> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.1.0</product> <product>tivoli_storage_manager:6.1.1</product> <product>tivoli_storage_manager:6.1.2</product> <product>tivoli_storage_manager:6.1.3</product> <product>tivoli_storage_manager:6.1.4</product> <product>tivoli_storage_manager:6.1.5</product> <product>tivoli_storage_manager:6.1.5.4</product> <product>tivoli_storage_manager:6.1.5.5</product> <product>tivoli_storage_manager:6.1.5.6</product> <product>tivoli_storage_manager:6.2</product> <product>tivoli_storage_manager:6.2.0</product> <product>tivoli_storage_manager:6.2.1</product> <product>tivoli_storage_manager:6.2.2</product> <product>tivoli_storage_manager:6.2.3</product> <product>tivoli_storage_manager:6.2.4</product> <product>tivoli_storage_manager:6.2.4.7</product> <product>tivoli_storage_manager:6.3</product> <product>tivoli_storage_manager:6.3.0</product> <product>tivoli_storage_manager:6.3.0.5</product> <product>tivoli_storage_manager:6.3.0.15</product> <product>tivoli_storage_manager:6.3.0.17</product> <product>tivoli_storage_manager:6.3.1</product> <product>tivoli_storage_manager:6.3.1.2</product> <product>tivoli_storage_manager:6.3.2.2</product> <product>tivoli_storage_manager:6.4</product> <product>tivoli_storage_manager:6.4.0</product> <product>tivoli_storage_manager:6.4.0.1</product> <product>tivoli_storage_manager:6.4.0.4</product> <product>tivoli_storage_manager:6.4.0.5</product> <product>tivoli_storage_manager:6.4.0.7</product> <product>tivoli_storage_manager:6.4.1.3</product> <product>tivoli_storage_manager:6.4.1.7</product> <product>tivoli_storage_manager:6.4.2.1</product> <product>tivoli_storage_manager:6.4.2.100</product> <product>tivoli_storage_manager:6.4.2.200</product> <product>tivoli_storage_manager:6.4.3</product> <product>tivoli_storage_manager:6.4.3.1</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1..5.100</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.0.3</product> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.2</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> </cve> <cve id="CVE-2016-1000000" level="LOW"> <product>whatsup_gold:16.4</product> </cve> <cve id="CVE-2016-1000003" level="LOW"> <product>mirror_manager:0.7.2</product> </cve> <cve id="CVE-2016-2091" level="LOW"> <product>libdwarf:20151114</product> </cve> <cve id="CVE-2016-2090" level="LOW"> <product>libbsd:0.8.1</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-2097" level="LOW"> <product>ruby_on_rails:3.2.22.1</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.2</product> <product>ruby_on_rails:4.0.3</product> <product>ruby_on_rails:4.0.4</product> <product>ruby_on_rails:4.0.4</product> <product>ruby_on_rails:4.0.5</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.7</product> <product>ruby_on_rails:4.0.8</product> <product>ruby_on_rails:4.0.9</product> <product>ruby_on_rails:4.0.10</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.1</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.3</product> <product>ruby_on_rails:4.1.4</product> <product>ruby_on_rails:4.1.5</product> <product>ruby_on_rails:4.1.6</product> <product>ruby_on_rails:4.1.6</product> <product>ruby_on_rails:4.1.7</product> <product>ruby_on_rails:4.1.7.1</product> <product>ruby_on_rails:4.1.8</product> <product>ruby_on_rails:4.1.9</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.12</product> <product>ruby_on_rails:4.1.13</product> <product>ruby_on_rails:4.1.14</product> <product>ruby_on_rails:4.1.14</product> <product>ruby_on_rails:4.1.14.1</product> </cve> <cve id="CVE-2016-2094" level="LOW"> <product>enterprise_application_platform:6.4.6</product> </cve> <cve id="CVE-2016-2099" level="LOW"> <product>xerces-c%2b%2b:3.1.3</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-1000007" level="MEDIUM"> <product>pagure:2.2.1</product> </cve> <cve id="CVE-2016-10438" level="LOW"> <product>fsm9055_firmware:-</product> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>qca4531_firmware:-</product> <product>qca9980_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-7065" level="LOW"> <product>jboss_enterprise_application_platform:4.0.0</product> <product>jboss_enterprise_application_platform:5.0.0</product> </cve> <cve id="CVE-2016-7060" level="LOW"> <product>quickstart_cloud_installer:1.0</product> </cve> <cve id="CVE-2016-7062" level="LOW"> <product>storage_console:2.0</product> <product>storage_console_node:2.0</product> </cve> <cve id="CVE-2016-3382" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3383" level="MEDIUM"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3384" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3385" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3386" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3387" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3388" level="HIGH"> <product>edge</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3389" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-4266" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4267" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4264" level="LOW"> <product>coldfusion:10.0</product> <product>coldfusion:11.0</product> </cve> <cve id="CVE-2016-10489" level="LOW"> <product>sd_400_firmware:-</product> </cve> <cve id="CVE-2016-4262" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4263" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4260" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4261" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-10482" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10483" level="LOW"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> </cve> <cve id="CVE-2016-10480" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10481" level="LOW"> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>qca4531_firmware:-</product> <product>qca6174a_firmware:-</product> <product>qca6574au_firmware:-</product> <product>qca6584_firmware:-</product> <product>qca6584au_firmware:-</product> <product>qca9377_firmware:-</product> <product>qca9378_firmware:-</product> <product>qca9379_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10486" level="LOW"> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10487" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10484" level="LOW"> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10485" level="LOW"> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-3960" level="LOW"> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> <product>vm_server:3.2</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> <product>xen:-</product> </cve> <cve id="CVE-2016-3963" level="LOW"> <product>scalance_s613</product> </cve> <cve id="CVE-2016-3968" level="MEDIUM"> <product>cyberoam_cr100ing_utm_firmware:10.6.3_mr-1_build_503</product> <product>cyberoam_cr35ing_utm_firmware:10.6.2_build_378</product> <product>cyberoam_cr35ing_utm_firmware:10.6.2_mr-1_build_383</product> </cve> <cve id="CVE-2016-3969" level="MEDIUM"> <product>email_gateway:7.6</product> <product>email_gateway:7.6.1</product> <product>email_gateway:7.6.2</product> <product>email_gateway:7.6.3</product> <product>email_gateway:7.6.4</product> </cve> <cve id="CVE-2016-8006" level="LOW"> <product>security_information_and_event_management:9.6.0</product> </cve> <cve id="CVE-2016-8007" level="MEDIUM"> <product>host_intrusion_prevention_services:8.0</product> </cve> <cve id="CVE-2016-8005" level="LOW"> <product>email_gateway:7.6.401</product> </cve> <cve id="CVE-2016-8008" level="LOW"> <product>security_scan_plus:3.11.376</product> </cve> <cve id="CVE-2016-8009" level="LOW"> <product>application_control:6.0.0</product> <product>application_control:6.1.0</product> <product>application_control:6.1.1</product> <product>application_control:6.1.2</product> <product>application_control:6.1.3</product> <product>application_control:6.2.0</product> <product>application_control:7.0.0</product> </cve> <cve id="CVE-2016-1038" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1039" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1034" level="LOW"> <product>creative_cloud:3.5.1.209</product> </cve> <cve id="CVE-2016-1035" level="LOW"> <product>robohelp:9</product> <product>robohelp:9.0.0.228</product> <product>robohelp:9.0.1</product> </cve> <cve id="CVE-2016-1036" level="MEDIUM"> <product>analytics_appmeasurement_for_flash_library:4.0</product> </cve> <cve id="CVE-2016-1037" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4003" level="MEDIUM"> <product>struts:2.3.24.1</product> </cve> <cve id="CVE-2016-1520" level="MEDIUM"> <product>wave:1.0.1.26</product> </cve> <cve id="CVE-2016-4007" level="LOW"> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-1524" level="LOW"> <product>prosafe_network_management_software_300:1.5.0.11</product> </cve> <cve id="CVE-2016-1525" level="LOW"> <product>prosafe_network_management_software_300:1.5.0.11</product> </cve> <cve id="CVE-2016-4009" level="LOW"> <product>pillow:3.1.0</product> </cve> <cve id="CVE-2016-4057" level="LOW"> <product>fusioncompute:v100r005c00</product> </cve> <cve id="CVE-2016-4056" level="MEDIUM"> <product>typo3:6.2</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.0</product> <product>typo3:6.2.1</product> <product>typo3:6.2.2</product> <product>typo3:6.2.3</product> <product>typo3:6.2.4</product> <product>typo3:6.2.5</product> <product>typo3:6.2.6</product> <product>typo3:6.2.7</product> <product>typo3:6.2.8</product> <product>typo3:6.2.9</product> <product>typo3:6.2.10</product> <product>typo3:6.2.10</product> <product>typo3:6.2.11</product> <product>typo3:6.2.12</product> <product>typo3:6.2.13</product> <product>typo3:6.2.14</product> <product>typo3:6.2.15</product> <product>typo3:6.2.16</product> <product>typo3:6.2.17</product> <product>typo3:6.2.18</product> </cve> <cve id="CVE-2016-1571" level="MEDIUM"> <product>xenserver:6.5</product> <product>xen:4.4.0</product> <product>xen:3.3.0</product> <product>xen:3.3.1</product> <product>xen:3.3.2</product> <product>xen:3.4.0</product> <product>xen:3.4.1</product> <product>xen:3.4.2</product> <product>xen:3.4.3</product> <product>xen:3.4.4</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.1.6</product> <product>xen:4.1.6.1</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.2.4</product> <product>xen:4.2.5</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.6.0</product> </cve> <cve id="CVE-2016-1570" level="MEDIUM"> <product>xen:3.4.0</product> <product>xen:3.4.1</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.1.6</product> <product>xen:4.1.6.1</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.2.4</product> <product>xen:4.2.5</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.6.0</product> </cve> <cve id="CVE-2016-1000220" level="MEDIUM"> <product>kibana:4.1.10</product> <product>kibana:4.5.3</product> </cve> <cve id="CVE-2016-1000221" level="LOW"> <product>logstash:2.3.3</product> </cve> <cve id="CVE-2016-1000222" level="LOW"> <product>logstash:2.1.1</product> </cve> <cve id="CVE-2016-5743" level="LOW"> <product>simatic_batch:7.1</product> <product>simatic_openpcs_7:8.1</product> <product>simatic_openpcs_7:8.2</product> <product>simatic_wincc:7.3</product> <product>simatic_wincc:7.4</product> </cve> <cve id="CVE-2016-5608" level="LOW"> <product>vm_virtualbox:5.0.26</product> <product>vm_virtualbox:5.1.6</product> </cve> <cve id="CVE-2016-5607" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5605" level="LOW"> <product>vm_virtualbox:5.1.2</product> </cve> <cve id="CVE-2016-5604" level="MEDIUM"> <product>enterprise_manager_base_platform:12.1.0.5</product> </cve> <cve id="CVE-2016-5603" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5602" level="MEDIUM"> <product>data_integrator:11.1.1.7.0</product> <product>data_integrator:11.1.1.9.0</product> <product>data_integrator:12.1.3.0.0</product> <product>data_integrator:12.2.1.0.0</product> <product>data_integrator:12.2.1.1.0</product> </cve> <cve id="CVE-2016-5600" level="LOW"> <product>your_sha256_hashnt:9.1</product> <product>your_sha256_hashnt:9.2</product> </cve> <cve id="CVE-2016-9937" level="LOW"> <product>asterisk:13.12</product> <product>asterisk:13.13</product> <product>asterisk:14.0</product> <product>asterisk:14.01</product> <product>asterisk:14.1.1</product> <product>asterisk:14.1.2</product> <product>asterisk:14.02</product> </cve> <cve id="CVE-2016-2958" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-2959" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2952" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2953" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-2950" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2951" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2956" level="MEDIUM"> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2957" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-2954" level="MEDIUM"> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-2955" level="MEDIUM"> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-8367" level="LOW"> <product>magelis_gto_advanced_optimum_panel_firmware:-</product> <product>magelis_gtu_universal_panel_firmware:-</product> <product>magelis_sto5_small_panel_firmware:-</product> <product>magelis_stu_small_panel_firmware:-</product> <product>magelis_xbt_gh_advanced_hand-held_panel_firmware:-</product> <product>your_sha256_hash:-</product> <product>magelis_xbt_gt_advanced_touchscreen_panel_firmware:-</product> <product>magelis_xbt_gtw_advanced_open_touchscreen_panel_firmware:-</product> </cve> <cve id="CVE-2016-5901" level="MEDIUM"> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.1</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.7.0</product> </cve> <cve id="CVE-2016-0800" level="MEDIUM"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>client:-</product> <product>steel_belted_radius:-</product> </cve> <cve id="CVE-2016-8362" level="LOW"> <product>awk-1121_firmware:06-29-2017</product> <product>awk-1127_firmware:06-29-2017</product> <product>awk-1131a_firmware:10-31-2016</product> <product>awk-3121-m12-rtg_firmware:06-29-2017</product> <product>awk-3131-m12-rcc_firmware:06-29-2017</product> <product>awk-3131a_firmware:10-31-2016</product> <product>awk-3191_firmware:05-30-2017</product> <product>awk-4131a_firmware:10-31-2016</product> <product>awk-5232-m12-rcc_firmware:06-29-2017</product> <product>awk-5232_firmware:05-30-2017</product> <product>awk-6232_firmware:05-30-2017</product> <product>oncellg3470a-lte_firmware:10-31-2016</product> <product>wac-1001_v2_firmware:06-29-2017</product> <product>wac-2004_firmware:06-29-2017</product> </cve> <cve id="CVE-2016-5744" level="LOW"> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.0</product> <product>simatic_wincc:7.2</product> </cve> <cve id="CVE-2016-7267" level="MEDIUM"> <product>excel:2010</product> <product>excel:2013</product> <product>excel:2013</product> <product>excel:2016</product> </cve> <cve id="CVE-2016-2271" level="LOW"> <product>xen:4.6.0</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-2379" level="LOW"> <product>mxit:-</product> </cve> <cve id="CVE-2016-7263" level="MEDIUM"> <product>excel_for_mac:2011</product> <product>excel_for_mac:2016</product> </cve> <cve id="CVE-2016-6963" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-2279" level="MEDIUM"> <product>compactlogix_controller_1769_firmware:20.018</product> <product>compactlogix_controller_1769_firmware:27.011</product> </cve> <cve id="CVE-2016-6962" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-2278" level="LOW"> <product>struxureware_building_operations_automation_server_as_firmware:1.7</product> <product>your_sha256_hash:1.7</product> </cve> <cve id="CVE-2016-8824" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8825" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8826" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8827" level="LOW"> <product>geforce_experience:3.1.0</product> </cve> <cve id="CVE-2016-8820" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8821" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8822" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8823" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-4460" level="LOW"> <product>pony_mail:0.6c</product> <product>pony_mail:0.7b</product> <product>pony_mail:0.8b</product> </cve> <cve id="CVE-2016-6079" level="LOW"> <product>aix:5.3</product> <product>aix:6.1</product> <product>aix:7.1</product> <product>aix:7.2</product> <product>vios:2.2.0.0</product> <product>vios:2.2.0.10</product> <product>vios:2.2.0.11</product> <product>vios:2.2.0.12</product> <product>vios:2.2.0.13</product> <product>vios:2.2.1.0</product> <product>vios:2.2.1.1</product> <product>vios:2.2.1.3</product> <product>vios:2.2.1.4</product> <product>vios:2.2.1.5</product> <product>vios:2.2.1.6</product> <product>vios:2.2.1.7</product> <product>vios:2.2.1.8</product> <product>vios:2.2.2.0</product> <product>vios:2.2.2.1</product> <product>vios:2.2.2.2</product> <product>vios:2.2.2.3</product> <product>vios:2.2.2.4</product> <product>vios:2.2.2.6</product> <product>vios:2.2.2.70</product> <product>vios:2.2.3.0</product> <product>vios:2.2.3.1</product> <product>vios:2.2.3.2</product> <product>vios:2.2.3.3</product> <product>vios:2.2.3.4</product> <product>vios:2.2.3.50</product> <product>vios:2.2.3.51</product> <product>vios:2.2.3.52</product> <product>vios:2.2.3.60</product> <product>vios:2.2.3.70</product> <product>vios:2.2.3.80</product> <product>vios:2.2.4.0</product> <product>vios:2.2.4.10</product> <product>vios:2.2.4.21</product> <product>vios:2.2.4.22</product> <product>vios:2.2.4.23</product> <product>vios:2.2.4.30</product> <product>vios:2.2.5.0</product> <product>vios:2.2.5.10</product> </cve> <cve id="CVE-2016-4461" level="LOW"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.5</product> <product>struts:2.3.6</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.9</product> <product>struts:2.3.10</product> <product>struts:2.3.11</product> <product>struts:2.3.12</product> <product>struts:2.3.13</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.17</product> <product>struts:2.3.19</product> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.2</product> <product>struts:2.3.21</product> <product>struts:2.3.22</product> <product>struts:2.3.23</product> <product>struts:2.3.24.2</product> <product>struts:2.3.24.3</product> <product>struts:2.3.25</product> <product>struts:2.3.26</product> <product>struts:2.3.27</product> <product>struts:2.3.28</product> <product>struts:2.3.28.1</product> </cve> <cve id="CVE-2016-6077" level="MEDIUM"> <product>cognos_disclosure_management:10.2.0</product> <product>cognos_disclosure_management:10.2.1</product> <product>cognos_disclosure_management:10.2.2</product> <product>cognos_disclosure_management:10.2.3</product> <product>cognos_disclosure_management:10.2.4</product> <product>cognos_disclosure_management:10.2.5</product> <product>cognos_disclosure_management:10.2.6</product> </cve> <cve id="CVE-2016-4462" level="LOW"> <product>ofbiz:11.04</product> <product>ofbiz:11.04.01</product> <product>ofbiz:11.04.02</product> <product>ofbiz:11.04.03</product> <product>ofbiz:11.04.04</product> <product>ofbiz:11.04.05</product> <product>ofbiz:11.04.06</product> <product>ofbiz:12.04</product> <product>ofbiz:12.04.01</product> <product>ofbiz:12.04.02</product> <product>ofbiz:12.04.03</product> <product>ofbiz:12.04.04</product> <product>ofbiz:12.04.05</product> <product>ofbiz:12.04.06</product> <product>ofbiz:13.07</product> <product>ofbiz:13.07.01</product> <product>ofbiz:13.07.02</product> <product>ofbiz:13.07.03</product> </cve> <cve id="CVE-2016-6072" level="MEDIUM"> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_for_aviation:-</product> <product>maximo_for_life_sciences:-</product> <product>maximo_for_nuclear_power:-</product> <product>maximo_for_oil_and_gas:-</product> <product>maximo_for_transportation:-</product> <product>maximo_for_utilities:-</product> <product>smartcloud_control_desk:-</product> <product>tivoli_asset_management_for_it:-</product> <product>tivoli_change_and_configuration_management_database:-</product> <product>tivoli_integration_composer:-</product> <product>tivoli_service_request_manager:-</product> </cve> <cve id="CVE-2016-8929" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8928" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8921" level="LOW"> <product>filenet_workplace_xt:1.1.5</product> </cve> <cve id="CVE-2016-4464" level="LOW"> <product>cxf_fediz:1.2.0</product> <product>cxf_fediz:1.2.1</product> <product>cxf_fediz:1.2.2</product> <product>cxf_fediz:1.3.0</product> </cve> <cve id="CVE-2016-8923" level="LOW"> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0.0</product> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:7.0.0.0</product> </cve> <cve id="CVE-2016-8922" level="MEDIUM"> <product>web_content_manager_production_analytics:4.0</product> <product>websphere_portal:8.0</product> <product>websphere_portal:8.5</product> </cve> <cve id="CVE-2016-8925" level="LOW"> <product>tivoli_application_dependency_discovery_manager:7.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.0</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.1</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.3</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.4</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.5</product> <product>tivoli_application_dependency_discovery_manager:7.3.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.1</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.2</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.3</product> </cve> <cve id="CVE-2016-8924" level="MEDIUM"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> </cve> <cve id="CVE-2016-8927" level="MEDIUM"> <product>tivoli_application_dependency_discovery_manager:7.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.0</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.1</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.3</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.4</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.5</product> <product>tivoli_application_dependency_discovery_manager:7.3.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.1</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.2</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.3</product> </cve> <cve id="CVE-2016-4465" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> <product>struts:2.3.28.1</product> <product>struts:2.5</product> <product>struts:2.5</product> <product>struts:2.5</product> <product>struts:2.5</product> </cve> <cve id="CVE-2016-1867" level="MEDIUM"> <product>jasper:1.900.1</product> </cve> <cve id="CVE-2016-1866" level="MEDIUM"> <product>salt:2015.8.0</product> <product>salt:2015.8.1</product> <product>salt:2015.8.2</product> <product>salt:2015.8.3</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-7476" level="LOW"> <product>big-ip_access_policy_manager:11.3.0</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.3.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.3.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_security_manager:11.3.0</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.3.0</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.3.0</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_local_traffic_manager:11.3.0</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.3.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_protocol_security_manager:11.3.0</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-7477" level="MEDIUM"> <product>libav:11.7</product> </cve> <cve id="CVE-2016-7474" level="LOW"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-4468" level="LOW"> <product>cloud_foundry:237.0</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_ops_manager:1.7.0</product> <product>cloud_foundry_ops_manager:1.7.1</product> <product>cloud_foundry_ops_manager:1.7.2</product> <product>cloud_foundry_ops_manager:1.7.3</product> <product>cloud_foundry_ops_manager:1.7.4</product> <product>cloud_foundry_ops_manager:1.7.5</product> <product>cloud_foundry_ops_manager:1.7.6</product> <product>cloud_foundry_ops_manager:1.7.7</product> <product>cloud_foundry_ops_manager:1.7.8</product> <product>cloud_foundry_uaa:3.4.0</product> <product>cloud_foundry_uaa_bosh:12.0</product> </cve> <cve id="CVE-2016-7114" level="LOW"> <product>en100_ethernet_module_firmware:4.28</product> </cve> <cve id="CVE-2016-3595" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3594" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3597" level="LOW"> <product>vm_virtualbox:5.0.24</product> </cve> <cve id="CVE-2016-3596" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3591" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3590" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3593" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3592" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-9848" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-6523" level="MEDIUM"> <product>dotclear:2.9.1</product> </cve> <cve id="CVE-2016-6030" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> </cve> <cve id="CVE-2016-3001" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-3000" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-7296" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-7297" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-3006" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-9842" level="MEDIUM"> <product>zlib:1.2.8</product> <product>leap:42.1</product> <product>leap:42.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3005" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-3004" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-9844" level="LOW"> <product>unzip:6.0</product> </cve> <cve id="CVE-2016-4925" level="LOW"> <product>junose:10.3.3</product> <product>junose:12.3.3</product> <product>junose:13.3.3</product> <product>junose:14.3.1</product> </cve> <cve id="CVE-2016-4924" level="LOW"> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> </cve> <cve id="CVE-2016-4927" level="MEDIUM"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-4926" level="LOW"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-4921" level="LOW"> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4r13</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x55</product> <product>junos:14.1x55</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> </cve> <cve id="CVE-2016-1731" level="LOW"> <product>software_update:2.1.3.127</product> </cve> <cve id="CVE-2016-4922" level="LOW"> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4r13</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x55</product> <product>junos:14.1x55</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> </cve> <cve id="CVE-2016-4929" level="LOW"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-4928" level="MEDIUM"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-5030" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5031" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5032" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5033" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5034" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5035" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5036" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5037" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5038" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5039" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-8211" level="LOW"> <product>data_protection_advisor:6.1</product> <product>data_protection_advisor:6.2</product> <product>data_protection_advisor:6.2.1</product> <product>data_protection_advisor:6.2.2</product> <product>data_protection_advisor:6.2.3</product> </cve> <cve id="CVE-2016-8217" level="LOW"> <product>rsa_bsafe_crypto-j:6.2.1</product> </cve> <cve id="CVE-2016-8216" level="LOW"> <product>data_domain_os:5.4</product> <product>data_domain_os:5.5</product> <product>data_domain_os:5.6</product> <product>data_domain_os:5.7</product> </cve> <cve id="CVE-2016-8215" level="MEDIUM"> <product>rsa_security_analytics:10.5</product> <product>rsa_security_analytics:10.5.1</product> <product>rsa_security_analytics:10.5.2</product> <product>rsa_security_analytics:10.6</product> <product>rsa_security_analytics:10.6.1</product> </cve> <cve id="CVE-2016-8214" level="LOW"> <product>avamar_data_store:7.3.0</product> <product>avamar_data_store:7.3.1</product> <product>avamar_virtual_edition:7.3.0</product> <product>avamar_virtual_edition:7.3.1</product> </cve> <cve id="CVE-2016-0024" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-0021" level="MEDIUM"> <product>infopath:2007</product> <product>infopath:2010</product> <product>infopath:2013</product> </cve> <cve id="CVE-2016-0028" level="MEDIUM"> <product>outlook_web_access</product> </cve> <cve id="CVE-2016-0029" level="MEDIUM"> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-9294" level="LOW"> <product>mujs:a5c747f1d40e8d6659a37a8d25f13fb5acf8e767</product> </cve> <cve id="CVE-2016-9296" level="LOW"> <product>p7zip:16.02</product> </cve> <cve id="CVE-2016-9297" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9298" level="MEDIUM"> <product>imagemagick:6.9.6-3</product> <product>imagemagick:7.0.1-0</product> <product>imagemagick:7.0.1-1</product> <product>imagemagick:7.0.1-2</product> <product>imagemagick:7.0.1-3</product> <product>imagemagick:7.0.1-4</product> <product>imagemagick:7.0.1-5</product> <product>imagemagick:7.0.1-6</product> <product>imagemagick:7.0.1-7</product> <product>imagemagick:7.0.1-8</product> <product>imagemagick:7.0.1-9</product> <product>imagemagick:7.0.1-10</product> <product>imagemagick:7.0.2-0</product> <product>imagemagick:7.0.2-1</product> <product>imagemagick:7.0.2-2</product> <product>imagemagick:7.0.2-3</product> <product>imagemagick:7.0.2-4</product> <product>imagemagick:7.0.2-5</product> <product>imagemagick:7.0.2-6</product> <product>imagemagick:7.0.2-7</product> <product>imagemagick:7.0.2-8</product> <product>imagemagick:7.0.2-9</product> <product>imagemagick:7.0.2-10</product> <product>imagemagick:7.0.3-0</product> <product>imagemagick:7.0.3-1</product> <product>imagemagick:7.0.3-2</product> <product>imagemagick:7.0.3-3</product> <product>imagemagick:7.0.3-4</product> <product>imagemagick:7.0.3-5</product> </cve> <cve id="CVE-2016-9299" level="LOW"> <product>jenkins:2.19.2</product> <product>jenkins:2.31</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-10547" level="MEDIUM"> <product>nunjucks:2.4.2</product> </cve> <cve id="CVE-2016-10546" level="LOW"> <product>pouchdb:6.0.4</product> </cve> <cve id="CVE-2016-10011" level="LOW"> <product>openssh:7.3</product> </cve> <cve id="CVE-2016-10542" level="LOW"> <product>ws:1.1.0</product> </cve> <cve id="CVE-2016-10541" level="LOW"> <product>shell-quote:1.6.0</product> </cve> <cve id="CVE-2016-10012" level="LOW"> <product>openssh:7.3</product> </cve> <cve id="CVE-2016-10549" level="HIGH"> <product>sails:0.12.7</product> </cve> <cve id="CVE-2016-10548" level="MEDIUM"> <product>reduce-css-calc:1.2.4</product> </cve> <cve id="CVE-2016-1199" level="LOW"> <product>ec-cube:3.0.0</product> <product>ec-cube:3.0.1</product> <product>ec-cube:3.0.2</product> <product>ec-cube:3.0.3</product> <product>ec-cube:3.0.4</product> <product>ec-cube:3.0.5</product> <product>ec-cube:3.0.6</product> <product>ec-cube:3.0.7</product> <product>ec-cube:3.0.8</product> <product>ec-cube:3.0.9</product> </cve> <cve id="CVE-2016-1198" level="MEDIUM"> <product>photopt:1.0.0</product> <product>photopt:1.1.0</product> </cve> <cve id="CVE-2016-1193" level="LOW"> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1192" level="LOW"> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1191" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1190" level="LOW"> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1197" level="MEDIUM"> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1196" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1195" level="MEDIUM"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1194" level="LOW"> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-2562" level="MEDIUM"> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>phpmyadmin:4.5.3.1</product> <product>phpmyadmin:4.5.4</product> <product>phpmyadmin:4.5.4.1</product> <product>phpmyadmin:4.5.5</product> </cve> <cve id="CVE-2016-2561" level="MEDIUM"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>phpmyadmin:4.5.3.1</product> <product>phpmyadmin:4.5.4</product> <product>phpmyadmin:4.5.4.1</product> <product>phpmyadmin:4.5.5</product> </cve> <cve id="CVE-2016-2560" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>phpmyadmin:4.5.3.1</product> <product>phpmyadmin:4.5.4</product> <product>phpmyadmin:4.5.4.1</product> <product>phpmyadmin:4.5.5</product> </cve> <cve id="CVE-2016-2567" level="LOW"> <product>galaxy_note_3_firmware:n9005xxugbob6</product> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-2566" level="LOW"> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-2565" level="LOW"> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-2564" level="MEDIUM"> <product>invision_power_board:4.1.8.1</product> </cve> <cve id="CVE-2016-2569" level="LOW"> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0.stable1</product> <product>squid:3.0.stable2</product> <product>squid:3.0.stable3</product> <product>squid:3.0.stable4</product> <product>squid:3.0.stable5</product> <product>squid:3.0.stable6</product> <product>squid:3.0.stable7</product> <product>squid:3.0.stable8</product> <product>squid:3.0.stable9</product> <product>squid:3.0.stable10</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable12</product> <product>squid:3.0.stable13</product> <product>squid:3.0.stable14</product> <product>squid:3.0.stable15</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable17</product> <product>squid:3.0.stable18</product> <product>squid:3.0.stable19</product> <product>squid:3.0.stable20</product> <product>squid:3.0.stable21</product> <product>squid:3.0.stable22</product> <product>squid:3.0.stable23</product> <product>squid:3.0.stable24</product> <product>squid:3.0.stable25</product> <product>squid:3.1</product> <product>squid:3.1.0.1</product> <product>squid:3.1.0.2</product> <product>squid:3.1.0.3</product> <product>squid:3.1.0.4</product> <product>squid:3.1.0.5</product> <product>squid:3.1.0.6</product> <product>squid:3.1.0.7</product> <product>squid:3.1.0.8</product> <product>squid:3.1.0.9</product> <product>squid:3.1.0.10</product> <product>squid:3.1.0.11</product> <product>squid:3.1.0.12</product> <product>squid:3.1.0.13</product> <product>squid:3.1.0.14</product> <product>squid:3.1.0.15</product> <product>squid:3.1.0.16</product> <product>squid:3.1.0.17</product> <product>squid:3.1.0.18</product> <product>squid:3.1.1</product> <product>squid:3.1.2</product> <product>squid:3.1.3</product> <product>squid:3.1.4</product> <product>squid:3.1.5</product> <product>squid:3.1.5.1</product> <product>squid:3.1.6</product> <product>squid:3.1.7</product> <product>squid:3.1.8</product> <product>squid:3.1.9</product> <product>squid:3.1.10</product> <product>squid:3.1.11</product> <product>squid:3.1.12</product> <product>squid:3.1.13</product> <product>squid:3.1.14</product> <product>squid:3.1.15</product> <product>squid:3.2.0.1</product> <product>squid:3.2.0.2</product> <product>squid:3.2.0.3</product> <product>squid:3.2.0.4</product> <product>squid:3.2.0.5</product> <product>squid:3.2.0.6</product> <product>squid:3.2.0.7</product> <product>squid:3.2.0.8</product> <product>squid:3.2.0.9</product> <product>squid:3.2.0.10</product> <product>squid:3.2.0.11</product> <product>squid:3.2.0.12</product> <product>squid:3.2.0.13</product> <product>squid:3.2.0.14</product> <product>squid:3.2.0.15</product> <product>squid:3.2.0.16</product> <product>squid:3.2.0.17</product> <product>squid:3.2.0.18</product> <product>squid:3.2.0.19</product> <product>squid:3.2.1</product> <product>squid:3.2.2</product> <product>squid:3.2.3</product> <product>squid:3.2.4</product> <product>squid:3.2.5</product> <product>squid:3.2.6</product> <product>squid:3.2.7</product> <product>squid:3.2.8</product> <product>squid:3.2.9</product> <product>squid:3.2.10</product> <product>squid:3.2.11</product> <product>squid:3.2.12</product> <product>squid:3.2.13</product> <product>squid:3.3.0</product> <product>squid:3.3.0.2</product> <product>squid:3.3.0.3</product> <product>squid:3.3.1</product> <product>squid:3.3.2</product> <product>squid:3.3.3</product> <product>squid:3.3.4</product> <product>squid:3.3.5</product> <product>squid:3.3.6</product> <product>squid:3.3.7</product> <product>squid:3.3.8</product> <product>squid:3.3.9</product> <product>squid:3.3.10</product> <product>squid:3.3.11</product> <product>squid:3.3.12</product> <product>squid:3.3.13</product> <product>squid:3.4.0.1</product> <product>squid:3.4.0.2</product> <product>squid:3.4.0.3</product> <product>squid:3.4.1</product> <product>squid:3.4.2</product> <product>squid:3.4.3</product> <product>squid:3.4.4</product> <product>squid:3.4.8</product> <product>squid:3.4.9</product> <product>squid:3.4.10</product> <product>squid:3.4.11</product> <product>squid:3.4.12</product> <product>squid:3.4.13</product> <product>squid:3.5.0.1</product> <product>squid:3.5.0.2</product> <product>squid:3.5.0.3</product> <product>squid:3.5.0.4</product> <product>squid:3.5.1</product> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> </cve> <cve id="CVE-2016-2568" level="MEDIUM"> <product>polkit</product> </cve> <cve id="CVE-2016-4055" level="LOW"> <product>moment:2.11.1</product> </cve> <cve id="CVE-2016-6246" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6247" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6244" level="LOW"> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6245" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6242" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6243" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6240" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6241" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6249" level="LOW"> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_websafe:11.5.0</product> <product>big-ip_websafe:11.5.1</product> <product>big-ip_websafe:11.5.2</product> <product>big-ip_websafe:11.5.3</product> <product>big-ip_websafe:11.5.4</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> </cve> <cve id="CVE-2016-7040" level="LOW"> <product>cloudforms_management_engine:4.1</product> </cve> <cve id="CVE-2016-7046" level="MEDIUM"> <product>jboss_enterprise_application_platform:7.0</product> </cve> <cve id="CVE-2016-10725" level="LOW"> <product>bitcoin-qt:0.3.4</product> <product>bitcoin-qt:0.3.5</product> <product>bitcoin-qt:0.3.8</product> <product>bitcoin-qt:0.3.10</product> <product>bitcoin-qt:0.3.11</product> <product>bitcoin-qt:0.3.12</product> <product>bitcoin-qt:0.4.0</product> <product>bitcoin-qt:0.4.1</product> <product>bitcoin-qt:0.4.1</product> <product>bitcoin-qt:0.4.2</product> <product>bitcoin-qt:0.4.3</product> <product>bitcoin-qt:0.4.4</product> <product>bitcoin-qt:0.4.4</product> <product>bitcoin-qt:0.4.5</product> <product>bitcoin-qt:0.4.6</product> <product>bitcoin-qt:0.4.7</product> <product>bitcoin-qt:0.5.0</product> <product>bitcoin-qt:0.5.1</product> <product>bitcoin-qt:0.5.2</product> <product>bitcoin-qt:0.5.3</product> <product>bitcoin-qt:0.5.3.1</product> <product>bitcoin-qt:0.5.4</product> <product>bitcoin-qt:0.5.5</product> <product>bitcoin-qt:0.5.6</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0.1</product> <product>bitcoin-qt:0.6.0.2</product> <product>bitcoin-qt:0.6.0.3</product> <product>bitcoin-qt:0.6.0.4</product> <product>bitcoin-qt:0.6.0.5</product> <product>bitcoin-qt:0.6.0.6</product> <product>bitcoin-qt:0.6.0.7</product> <product>bitcoin-qt:0.6.0.8</product> <product>bitcoin-qt:0.6.1</product> <product>bitcoin-qt:0.6.2</product> <product>bitcoin-qt:0.8.0</product> <product>bitcoin-qt:0.8.1</product> <product>bitcoind:0.3.4</product> <product>bitcoind:0.3.5</product> <product>bitcoind:0.3.8</product> <product>bitcoind:0.3.10</product> <product>bitcoind:0.3.11</product> <product>bitcoind:0.3.12</product> <product>bitcoind:0.4.0</product> <product>bitcoind:0.4.1</product> <product>bitcoind:0.4.1</product> <product>bitcoind:0.4.2</product> <product>bitcoind:0.4.3</product> <product>bitcoind:0.4.4</product> <product>bitcoind:0.4.4</product> <product>bitcoind:0.4.5</product> <product>bitcoind:0.4.6</product> <product>bitcoind:0.4.7</product> <product>bitcoind:0.5.0</product> <product>bitcoind:0.5.1</product> <product>bitcoind:0.5.2</product> <product>bitcoind:0.5.3</product> <product>bitcoind:0.5.3.1</product> <product>bitcoind:0.5.4</product> <product>bitcoind:0.5.5</product> <product>bitcoind:0.5.6</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0.1</product> <product>bitcoind:0.6.0.2</product> <product>bitcoind:0.6.0.3</product> <product>bitcoind:0.6.0.4</product> <product>bitcoind:0.6.0.5</product> <product>bitcoind:0.6.0.6</product> <product>bitcoind:0.6.0.7</product> <product>bitcoind:0.6.0.8</product> <product>bitcoind:0.6.1</product> <product>bitcoind:0.6.2</product> <product>bitcoind:0.8.0</product> <product>bitcoind:0.8.1</product> </cve> <cve id="CVE-2016-10724" level="LOW"> <product>bitcoin-qt:0.3.4</product> <product>bitcoin-qt:0.3.5</product> <product>bitcoin-qt:0.3.8</product> <product>bitcoin-qt:0.3.10</product> <product>bitcoin-qt:0.3.11</product> <product>bitcoin-qt:0.3.12</product> <product>bitcoin-qt:0.4.0</product> <product>bitcoin-qt:0.4.1</product> <product>bitcoin-qt:0.4.1</product> <product>bitcoin-qt:0.4.2</product> <product>bitcoin-qt:0.4.3</product> <product>bitcoin-qt:0.4.4</product> <product>bitcoin-qt:0.4.4</product> <product>bitcoin-qt:0.4.5</product> <product>bitcoin-qt:0.4.6</product> <product>bitcoin-qt:0.4.7</product> <product>bitcoin-qt:0.5.0</product> <product>bitcoin-qt:0.5.1</product> <product>bitcoin-qt:0.5.2</product> <product>bitcoin-qt:0.5.3</product> <product>bitcoin-qt:0.5.3.1</product> <product>bitcoin-qt:0.5.4</product> <product>bitcoin-qt:0.5.5</product> <product>bitcoin-qt:0.5.6</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0</product> <product>bitcoin-qt:0.6.0.1</product> <product>bitcoin-qt:0.6.0.2</product> <product>bitcoin-qt:0.6.0.3</product> <product>bitcoin-qt:0.6.0.4</product> <product>bitcoin-qt:0.6.0.5</product> <product>bitcoin-qt:0.6.0.6</product> <product>bitcoin-qt:0.6.0.7</product> <product>bitcoin-qt:0.6.0.8</product> <product>bitcoin-qt:0.6.1</product> <product>bitcoin-qt:0.6.2</product> <product>bitcoin-qt:0.8.0</product> <product>bitcoin-qt:0.8.1</product> <product>bitcoind:0.3.4</product> <product>bitcoind:0.3.5</product> <product>bitcoind:0.3.8</product> <product>bitcoind:0.3.10</product> <product>bitcoind:0.3.11</product> <product>bitcoind:0.3.12</product> <product>bitcoind:0.4.0</product> <product>bitcoind:0.4.1</product> <product>bitcoind:0.4.1</product> <product>bitcoind:0.4.2</product> <product>bitcoind:0.4.3</product> <product>bitcoind:0.4.4</product> <product>bitcoind:0.4.4</product> <product>bitcoind:0.4.5</product> <product>bitcoind:0.4.6</product> <product>bitcoind:0.4.7</product> <product>bitcoind:0.5.0</product> <product>bitcoind:0.5.1</product> <product>bitcoind:0.5.2</product> <product>bitcoind:0.5.3</product> <product>bitcoind:0.5.3.1</product> <product>bitcoind:0.5.4</product> <product>bitcoind:0.5.5</product> <product>bitcoind:0.5.6</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0</product> <product>bitcoind:0.6.0.1</product> <product>bitcoind:0.6.0.2</product> <product>bitcoind:0.6.0.3</product> <product>bitcoind:0.6.0.4</product> <product>bitcoind:0.6.0.5</product> <product>bitcoind:0.6.0.6</product> <product>bitcoind:0.6.0.7</product> <product>bitcoind:0.6.0.8</product> <product>bitcoind:0.6.1</product> <product>bitcoind:0.6.2</product> <product>bitcoind:0.8.0</product> <product>bitcoind:0.8.1</product> </cve> <cve id="CVE-2016-10713" level="MEDIUM"> <product>patch:2.7.1</product> </cve> <cve id="CVE-2016-10717" level="LOW"> <product>malwarebytes_anti-malware:2.2.1</product> </cve> <cve id="CVE-2016-10715" level="MEDIUM"> <product>kanban_board:1.4</product> </cve> <cve id="CVE-2016-10728" level="LOW"> <product>suricata:0.8.2</product> <product>suricata:1.0.0</product> <product>suricata:1.0.1</product> <product>suricata:1.0.2</product> <product>suricata:1.0.3</product> <product>suricata:1.0.4</product> <product>suricata:1.0.5</product> <product>suricata:1.1</product> <product>suricata:1.1</product> <product>suricata:1.1</product> <product>suricata:1.1</product> <product>suricata:1.1</product> <product>suricata:1.1.1</product> <product>suricata:1.2</product> <product>suricata:1.2</product> <product>suricata:1.2.1</product> <product>suricata:1.3</product> <product>suricata:1.3</product> <product>suricata:1.3</product> <product>suricata:1.3</product> <product>suricata:1.3</product> <product>suricata:1.3.1</product> <product>suricata:1.3.2</product> <product>suricata:1.3.3</product> <product>suricata:1.3.4</product> <product>suricata:1.3.5</product> <product>suricata:1.3.6</product> <product>suricata:1.4</product> <product>suricata:1.4</product> <product>suricata:1.4</product> <product>suricata:1.4</product> <product>suricata:1.4</product> <product>suricata:1.4.1</product> <product>suricata:1.4.2</product> <product>suricata:1.4.3</product> <product>suricata:1.4.4</product> <product>suricata:1.4.5</product> <product>suricata:1.4.6</product> <product>suricata:1.4.7</product> <product>suricata:2.0</product> <product>suricata:2.0</product> <product>suricata:2.0</product> <product>suricata:2.0</product> <product>suricata:2.0</product> <product>suricata:2.0</product> <product>suricata:2.0.1</product> <product>suricata:2.0.1</product> <product>suricata:2.0.2</product> <product>suricata:2.0.3</product> <product>suricata:2.0.4</product> <product>suricata:2.0.5</product> <product>suricata:2.0.6</product> <product>suricata:2.0.7</product> <product>suricata:2.0.8</product> <product>suricata:2.0.9</product> <product>suricata:2.0.10</product> <product>suricata:2.0.11</product> <product>suricata:2.1</product> <product>suricata:2.1</product> <product>suricata:2.1</product> <product>suricata:2.1</product> <product>suricata:3.0</product> <product>suricata:3.0</product> <product>suricata:3.0</product> <product>suricata:3.0</product> <product>suricata:3.0.1</product> <product>suricata:3.0.1</product> <product>suricata:3.0.2</product> <product>suricata:3.1</product> <product>suricata:3.1</product> <product>suricata:3.1.1</product> </cve> <cve id="CVE-2016-9998" level="MEDIUM"> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.1</product> <product>spip:3.1.2</product> <product>spip:3.1.3</product> </cve> <cve id="CVE-2016-8024" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8025" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8026" level="LOW"> <product>security_scan_plus:3.11.469</product> </cve> <cve id="CVE-2016-8027" level="LOW"> <product>epolicy_orchestrator:5.1.3</product> <product>epolicy_orchestrator:5.3.2</product> </cve> <cve id="CVE-2016-8020" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8021" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8022" level="HIGH"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8023" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-4028" level="MEDIUM"> <product>ox_guard:2.4.0</product> </cve> <cve id="CVE-2016-1058" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1059" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1500" level="MEDIUM"> <product>owncloud:7.0.11</product> <product>owncloud:8.0.0</product> <product>owncloud:8.0.2</product> <product>owncloud:8.0.3</product> <product>owncloud:8.0.4</product> <product>owncloud:8.0.5</product> <product>owncloud:8.0.6</product> <product>owncloud:8.0.8</product> <product>owncloud:8.0.9</product> <product>owncloud:8.1.0</product> <product>owncloud:8.1.1</product> <product>owncloud:8.1.3</product> <product>owncloud:8.1.4</product> <product>owncloud:8.2.0</product> <product>owncloud:8.2.1</product> </cve> <cve id="CVE-2016-1501" level="LOW"> <product>owncloud:8.0.8</product> <product>owncloud:8.1.0</product> <product>owncloud:8.1.1</product> <product>owncloud:8.1.3</product> </cve> <cve id="CVE-2016-1502" level="LOW"> <product>snapcenter_server:1.0</product> <product>snapcenter_server:1.0</product> </cve> <cve id="CVE-2016-1051" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1504" level="LOW"> <product>dhcpcd:6.9.4</product> </cve> <cve id="CVE-2016-1505" level="LOW"> <product>radicale:1.0.1</product> </cve> <cve id="CVE-2016-4026" level="MEDIUM"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-4027" level="MEDIUM"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-5997" level="LOW"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-5996" level="LOW"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-5995" level="MEDIUM"> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:11.1.0.0</product> <product>db2:11.1.0.0</product> <product>db2:11.1.0.0</product> <product>db2:11.1.0.0</product> <product>db2:11.1.0.0</product> <product>db2:11.1.0.0</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.7</product> <product>db2_connect:10.5.0.7</product> <product>db2_connect:10.5.0.7</product> <product>db2_connect:11.1.0.0</product> <product>db2_connect:11.1.0.0</product> <product>db2_connect:11.1.0.0</product> </cve> <cve id="CVE-2016-5994" level="LOW"> <product>infosphere_information_server:11.5</product> </cve> <cve id="CVE-2016-5992" level="MEDIUM"> <product>sterling_connect%3adirect:4.5</product> <product>sterling_connect%3adirect:4.5.01</product> <product>sterling_connect%3adirect:4.6</product> <product>sterling_connect%3adirect:4.7</product> </cve> <cve id="CVE-2016-5991" level="MEDIUM"> <product>sterling_connect%3adirect:4.5</product> <product>sterling_connect%3adirect:4.5.01</product> <product>sterling_connect%3adirect:4.6</product> <product>sterling_connect%3adirect:4.7</product> </cve> <cve id="CVE-2016-5990" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-9889" level="MEDIUM"> <product>tikiwiki_cms%2fgroupware:12.0</product> <product>tikiwiki_cms%2fgroupware:12.1</product> <product>tikiwiki_cms%2fgroupware:12.2</product> <product>tikiwiki_cms%2fgroupware:12.3</product> <product>tikiwiki_cms%2fgroupware:12.4</product> <product>tikiwiki_cms%2fgroupware:12.5</product> <product>tikiwiki_cms%2fgroupware:12.6</product> <product>tikiwiki_cms%2fgroupware:12.7</product> <product>tikiwiki_cms%2fgroupware:12.8</product> <product>tikiwiki_cms%2fgroupware:12.9</product> <product>tikiwiki_cms%2fgroupware:15.0</product> <product>tikiwiki_cms%2fgroupware:15.1</product> <product>tikiwiki_cms%2fgroupware:15.2</product> <product>tikiwiki_cms%2fgroupware:16.0</product> </cve> <cve id="CVE-2016-9888" level="MEDIUM"> <product>libgsf:1.14.40</product> </cve> <cve id="CVE-2016-9885" level="LOW"> <product>gemfire_for_pivotal_cloud_foundry:1.6.0.0</product> <product>gemfire_for_pivotal_cloud_foundry:1.6.1</product> <product>gemfire_for_pivotal_cloud_foundry:1.6.2</product> <product>gemfire_for_pivotal_cloud_foundry:1.6.3.0</product> <product>gemfire_for_pivotal_cloud_foundry:1.6.4.0</product> <product>gemfire_for_pivotal_cloud_foundry:1.7.0.0</product> </cve> <cve id="CVE-2016-9880" level="LOW"> <product>gemfire_for_pivotal_cloud_foundry:1.7.0</product> </cve> <cve id="CVE-2016-9882" level="LOW"> <product>capi-release:1.11.0</product> <product>cf-release:249.0</product> </cve> <cve id="CVE-2016-5372" level="MEDIUM"> <product>snap_creator_framework:4.3.0</product> </cve> <cve id="CVE-2016-3469" level="LOW"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-5374" level="LOW"> <product>data_ontap:9.0</product> <product>data_ontap:9.1</product> </cve> <cve id="CVE-2016-2970" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-7924" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-2972" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2973" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-9081" level="LOW"> <product>joomla%21:3.4.4</product> <product>joomla%21:3.4.5</product> <product>joomla%21:3.4.6</product> <product>joomla%21:3.4.7</product> <product>joomla%21:3.4.8</product> <product>joomla%21:3.4.8</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.0</product> <product>joomla%21:3.5.1</product> <product>joomla%21:3.5.1</product> <product>joomla%21:3.5.1</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.0</product> <product>joomla%21:3.6.1</product> <product>joomla%21:3.6.1</product> <product>joomla%21:3.6.1</product> <product>joomla%21:3.6.2</product> <product>joomla%21:3.6.3</product> <product>joomla%21:3.6.3</product> <product>joomla%21:3.6.3</product> <product>joomla%21:3.6.3</product> </cve> <cve id="CVE-2016-2975" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2976" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-9082" level="MEDIUM"> <product>cairo:1.14.6</product> </cve> <cve id="CVE-2016-2978" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2979" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-7926" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7922" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0203" level="LOW"> <product>cloud_orchestrator:2.4</product> <product>cloud_orchestrator:2.4.0.1</product> <product>cloud_orchestrator:2.4.0.2</product> <product>cloud_orchestrator:2.4.0.3</product> <product>cloud_orchestrator:2.5</product> <product>cloud_orchestrator:2.5.01</product> <product>smartcloud_orchestrator:2.3</product> <product>smartcloud_orchestrator:2.3.0.1</product> </cve> <cve id="CVE-2016-2354" level="LOW"> <product>bluedriver:6.3.2</product> </cve> <cve id="CVE-2016-2355" level="LOW"> <product>dotcms:3.3.1</product> </cve> <cve id="CVE-2016-2350" level="MEDIUM"> <product>file_transfer_appliance:9_11_210</product> </cve> <cve id="CVE-2016-2351" level="LOW"> <product>file_transfer_appliance:9_11_210</product> </cve> <cve id="CVE-2016-2352" level="LOW"> <product>file_transfer_appliance:9_11_210</product> </cve> <cve id="CVE-2016-2353" level="LOW"> <product>file_transfer_appliance:9_11_210</product> </cve> <cve id="CVE-2016-3025" level="LOW"> <product>security_access_manager:9.0.0</product> <product>security_access_manager:9.0.0.1</product> <product>security_access_manager:9.0.1.0</product> <product>security_access_manager_for_mobile:8.0.0.0</product> <product>security_access_manager_for_mobile:8.0.0.1</product> <product>security_access_manager_for_mobile:8.0.0.2</product> <product>security_access_manager_for_mobile:8.0.0.3</product> <product>security_access_manager_for_mobile:8.0.0.4</product> <product>security_access_manager_for_mobile:8.0.0.5</product> <product>security_access_manager_for_mobile:8.0.1</product> <product>security_access_manager_for_mobile:8.0.1.2</product> <product>security_access_manager_for_mobile:8.0.1.3</product> <product>security_access_manager_for_mobile:8.0.1.4</product> </cve> <cve id="CVE-2016-3024" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-3027" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-3021" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-3020" level="MEDIUM"> <product>security_access_manager_for_mobile</product> <product>security_access_manager_9.0_firmware</product> <product>security_access_manager_for_web_7.0_firmware</product> <product>security_access_manager_for_web_8.0_firmware</product> </cve> <cve id="CVE-2016-3023" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-3022" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-3029" level="MEDIUM"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-6056" level="MEDIUM"> <product>call_center_for_commerce:9.3</product> <product>call_center_for_commerce:9.4</product> </cve> <cve id="CVE-2016-6055" level="MEDIUM"> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_requirements_composer:4.0.1</product> <product>rational_requirements_composer:4.0.2</product> <product>rational_requirements_composer:4.0.3</product> <product>rational_requirements_composer:4.0.4</product> <product>rational_requirements_composer:4.0.5</product> <product>rational_requirements_composer:4.0.6</product> <product>rational_requirements_composer:4.0.7</product> </cve> <cve id="CVE-2016-6054" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-8907" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8906" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8905" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8904" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8903" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8902" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-8909" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8908" level="LOW"> <product>dotcms:3.3</product> </cve> <cve id="CVE-2016-7452" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7453" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7454" level="MEDIUM"> <product>xfinity_gateway_router_dpc3941t_firmware:dpc3941-p20-18-v303r20421733-160413a-cmcst</product> </cve> <cve id="CVE-2016-7456" level="LOW"> <product>vsphere_data_protection:5.5.1</product> <product>vsphere_data_protection:5.5.5</product> <product>vsphere_data_protection:5.5.6</product> <product>vsphere_data_protection:5.5.7</product> <product>vsphere_data_protection:5.5.8</product> <product>vsphere_data_protection:5.5.9</product> <product>vsphere_data_protection:5.5.10</product> <product>vsphere_data_protection:5.5.11</product> <product>vsphere_data_protection:5.8.0</product> <product>vsphere_data_protection:5.8.1</product> <product>vsphere_data_protection:5.8.2</product> <product>vsphere_data_protection:5.8.3</product> <product>vsphere_data_protection:5.8.4</product> <product>vsphere_data_protection:6.0.0</product> <product>vsphere_data_protection:6.0.1</product> <product>vsphere_data_protection:6.0.2</product> <product>vsphere_data_protection:6.0.3</product> <product>vsphere_data_protection:6.0.4</product> <product>vsphere_data_protection:6.1.0</product> <product>vsphere_data_protection:6.1.1</product> <product>vsphere_data_protection:6.1.2</product> <product>vsphere_data_protection:6.1.3</product> </cve> <cve id="CVE-2016-7457" level="LOW"> <product>vrealize_operations:6.0.0</product> <product>vrealize_operations:6.1.0</product> <product>vrealize_operations:6.2.0a</product> <product>vrealize_operations:6.2.1</product> <product>vrealize_operations:6.3.0</product> </cve> <cve id="CVE-2016-7458" level="LOW"> <product>vsphere_client:5.5</product> <product>vsphere_client:5.5</product> <product>vsphere_client:5.5</product> <product>vsphere_client:5.5</product> <product>vsphere_client:5.5</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> <product>vsphere_client:6.0</product> </cve> <cve id="CVE-2016-7459" level="LOW"> <product>vcenter_server:5.0</product> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:5.5</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> <product>vcenter_server:6.0</product> </cve> <cve id="CVE-2016-6373" level="LOW"> <product>cloud_services_platform_2100:2.0.0_base</product> </cve> <cve id="CVE-2016-0226" level="MEDIUM"> <product>informix_dynamic_server:11.70.xcn</product> </cve> <cve id="CVE-2016-7907" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-7904" level="MEDIUM"> <product>cms_made_simple:2.1.5</product> </cve> <cve id="CVE-2016-0225" level="LOW"> <product>websphere_commerce:6.0</product> <product>websphere_commerce:6.0.0.1</product> <product>websphere_commerce:6.0.0.2</product> <product>websphere_commerce:6.0.0.3</product> <product>websphere_commerce:6.0.0.4</product> <product>websphere_commerce:6.0.0.5</product> <product>websphere_commerce:6.0.0.6</product> <product>websphere_commerce:6.0.0.7</product> <product>websphere_commerce:6.0.0.8</product> <product>websphere_commerce:6.0.0.9</product> <product>websphere_commerce:6.0.0.10</product> <product>websphere_commerce:6.0.0.11</product> <product>websphere_commerce:7.0</product> <product>websphere_commerce:7.0.0.1</product> <product>websphere_commerce:7.0.0.2</product> <product>websphere_commerce:7.0.0.3</product> <product>websphere_commerce:7.0.0.4</product> <product>websphere_commerce:7.0.0.5</product> <product>websphere_commerce:7.0.0.6</product> <product>websphere_commerce:7.0.0.7</product> <product>websphere_commerce:7.0.0.8</product> <product>websphere_commerce:7.0.0.9</product> </cve> <cve id="CVE-2016-7902" level="LOW"> <product>dotclear:2.10.2</product> </cve> <cve id="CVE-2016-0591" level="LOW"> <product>peoplesoft_supply_chain_management_purchasing:9.1</product> <product>peoplesoft_supply_chain_management_purchasing:9.2</product> </cve> <cve id="CVE-2016-0592" level="LOW"> <product>vm_virtualbox:4.3.35</product> <product>vm_virtualbox:5.0.13</product> </cve> <cve id="CVE-2016-0221" level="MEDIUM"> <product>cognos_business_intelligence:10.1.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.1</product> <product>cognos_business_intelligence:10.2.1.1</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-6375" level="MEDIUM"> <product>wireless_lan_controller_software:3.0_base</product> <product>wireless_lan_controller_software:3.1.59.24</product> <product>wireless_lan_controller_software:3.1.105.0</product> <product>wireless_lan_controller_software:3.1.111.0</product> <product>wireless_lan_controller_software:3.2.78.0</product> <product>wireless_lan_controller_software:3.2.116.21</product> <product>wireless_lan_controller_software:3.2.150.6</product> <product>wireless_lan_controller_software:3.2.150.10</product> <product>wireless_lan_controller_software:3.2.171.5</product> <product>wireless_lan_controller_software:3.2.171.6</product> <product>wireless_lan_controller_software:3.2.185.0</product> <product>wireless_lan_controller_software:3.2.193.5</product> <product>wireless_lan_controller_software:3.2.195.10</product> <product>wireless_lan_controller_software:3.6.0e</product> <product>wireless_lan_controller_software:4.0.108</product> <product>wireless_lan_controller_software:4.0.155.0</product> <product>wireless_lan_controller_software:4.0.155.5</product> <product>wireless_lan_controller_software:4.0.179.8</product> <product>wireless_lan_controller_software:4.0.179.11</product> <product>wireless_lan_controller_software:4.0.196</product> <product>wireless_lan_controller_software:4.0.206.0</product> <product>wireless_lan_controller_software:4.0.217.0</product> <product>wireless_lan_controller_software:4.0.219.0</product> <product>wireless_lan_controller_software:4.1.171.0</product> <product>wireless_lan_controller_software:4.1.181.0</product> <product>wireless_lan_controller_software:4.1.185.0</product> <product>wireless_lan_controller_software:4.1_base</product> <product>wireless_lan_controller_software:4.2.61.0</product> <product>wireless_lan_controller_software:4.2.99.0</product> <product>wireless_lan_controller_software:4.2.112.0</product> <product>wireless_lan_controller_software:4.2.117.0</product> <product>wireless_lan_controller_software:4.2.130.0</product> <product>wireless_lan_controller_software:4.2.173.0</product> <product>wireless_lan_controller_software:4.2.174.0</product> <product>wireless_lan_controller_software:4.2.176.0</product> <product>wireless_lan_controller_software:4.2.182.0</product> <product>wireless_lan_controller_software:4.2_base</product> <product>wireless_lan_controller_software:5.0.148.0</product> <product>wireless_lan_controller_software:5.0.148.2</product> <product>wireless_lan_controller_software:5.1.151.0</product> <product>wireless_lan_controller_software:5.1.152.0</product> <product>wireless_lan_controller_software:5.1.160.0</product> <product>wireless_lan_controller_software:5.2.157.0</product> <product>wireless_lan_controller_software:5.2.169.0</product> <product>wireless_lan_controller_software:6.0_base</product> <product>wireless_lan_controller_software:7.0_base</product> <product>wireless_lan_controller_software:7.1_base</product> <product>wireless_lan_controller_software:7.2_base</product> <product>wireless_lan_controller_software:7.3.101.0</product> <product>wireless_lan_controller_software:7.3.103.8</product> <product>wireless_lan_controller_software:7.3.112</product> <product>wireless_lan_controller_software:7.3_base</product> <product>wireless_lan_controller_software:7.4.1.1</product> <product>wireless_lan_controller_software:7.4.100</product> <product>wireless_lan_controller_software:7.4.100.60</product> <product>wireless_lan_controller_software:7.4.110.0</product> <product>wireless_lan_controller_software:7.4.121.0</product> <product>wireless_lan_controller_software:7.4_base</product> <product>wireless_lan_controller_software:7.5.102.0</product> <product>wireless_lan_controller_software:7.5.102.11</product> <product>wireless_lan_controller_software:7.5_base</product> <product>wireless_lan_controller_software:7.6.1.62</product> <product>wireless_lan_controller_software:7.6.100.0</product> <product>wireless_lan_controller_software:7.6.110.0</product> <product>wireless_lan_controller_software:7.6.120.0</product> <product>wireless_lan_controller_software:7.6.130.0</product> <product>wireless_lan_controller_software:8.0.0</product> <product>wireless_lan_controller_software:8.0.0.30220.385</product> <product>wireless_lan_controller_software:8.0.72.140</product> <product>wireless_lan_controller_software:8.0.100</product> <product>wireless_lan_controller_software:8.0.115.0</product> <product>wireless_lan_controller_software:8.0.120.0</product> <product>wireless_lan_controller_software:8.0.121.0</product> <product>wireless_lan_controller_software:8.1.0</product> <product>wireless_lan_controller_software:8.1.104.37</product> <product>wireless_lan_controller_software:8.1.111.0</product> <product>wireless_lan_controller_software:8.1.122.0</product> <product>wireless_lan_controller_software:8.1.130.0</product> <product>wireless_lan_controller_software_6.0:182.0</product> <product>wireless_lan_controller_software_6.0:188.0</product> <product>wireless_lan_controller_software_6.0:196.0</product> <product>wireless_lan_controller_software_6.0:199.4</product> <product>wireless_lan_controller_software_6.0:202.0</product> <product>wireless_lan_controller_software_7.0:98.0</product> <product>wireless_lan_controller_software_7.0:98.218</product> <product>wireless_lan_controller_software_7.0:116.0</product> <product>wireless_lan_controller_software_7.0:220.0</product> <product>wireless_lan_controller_software_7.0:240.0</product> <product>wireless_lan_controller_software_7.0:250.0</product> <product>wireless_lan_controller_software_7.0:252.0</product> <product>wireless_lan_controller_software_7.1:91.0</product> <product>wireless_lan_controller_software_7.2:103.0</product> <product>wireless_lan_controller_software_7.4:1.19</product> <product>wireless_lan_controller_software_7.4:1.54</product> <product>wireless_lan_controller_software_7.4:140.0</product> </cve> <cve id="CVE-2016-0228" level="MEDIUM"> <product>marketing_platform:10.0</product> </cve> <cve id="CVE-2016-0229" level="MEDIUM"> <product>marketing_platform:8.6.0.0</product> <product>marketing_platform:8.6.0.1</product> <product>marketing_platform:8.6.0.2</product> <product>marketing_platform:8.6.0.3</product> <product>marketing_platform:8.6.0.4</product> <product>marketing_platform:8.6.0.5</product> <product>marketing_platform:8.6.0.6</product> <product>marketing_platform:8.6.0.7</product> <product>marketing_platform:8.6.0.8</product> <product>marketing_platform:8.6.0.9</product> <product>marketing_platform:8.6.0.10</product> <product>marketing_platform:8.6.0.11</product> <product>marketing_platform:9.0.0.0</product> <product>marketing_platform:9.0.0.1</product> <product>marketing_platform:9.0.0.2</product> <product>marketing_platform:9.0.0.3</product> <product>marketing_platform:9.0.0.4</product> <product>marketing_platform:9.1.0.0</product> <product>marketing_platform:9.1.0.1</product> <product>marketing_platform:9.1.0.2</product> <product>marketing_platform:9.1.0.3</product> <product>marketing_platform:9.1.0.4</product> <product>marketing_platform:9.1.0.5</product> <product>marketing_platform:9.1.0.6</product> <product>marketing_platform:9.1.0.7</product> <product>marketing_platform:9.1.0.8</product> <product>marketing_platform:9.1.0.9</product> <product>marketing_platform:9.1.0.10</product> <product>marketing_platform:9.1.1.0</product> <product>marketing_platform:9.1.1.1</product> <product>marketing_platform:9.1.1.2</product> <product>marketing_platform:9.1.1.3</product> <product>marketing_platform:9.1.1.4</product> <product>marketing_platform:9.1.2.0</product> </cve> <cve id="CVE-2016-4903" level="MEDIUM"> <product>olivecart:3.1.2</product> <product>olivecartpro:3.1.7</product> </cve> <cve id="CVE-2016-4902" level="MEDIUM"> <product>the_public_certification_service_for_individuals:2.6</product> <product>the_public_certification_service_for_individuals_for_windows_7:3.0.1</product> <product>your_sha256_hashta:3.0.1</product> </cve> <cve id="CVE-2016-4901" level="MEDIUM"> <product>e-tax:-</product> </cve> <cve id="CVE-2016-4900" level="MEDIUM"> <product>evernote:6.2.1</product> </cve> <cve id="CVE-2016-4907" level="MEDIUM"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-4906" level="MEDIUM"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-4905" level="LOW"> <product>olivecart:3.1.2</product> <product>olivecartpro:3.1.7</product> </cve> <cve id="CVE-2016-4904" level="MEDIUM"> <product>olivecart:3.1.2</product> <product>olivecartpro:3.1.7</product> </cve> <cve id="CVE-2016-4909" level="MEDIUM"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-4908" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-8271" level="LOW"> <product>espace_iad_firmware:v300r002c01spc100</product> </cve> <cve id="CVE-2016-8273" level="MEDIUM"> <product>hisuite:4.0.5.300_ove</product> </cve> <cve id="CVE-2016-8272" level="LOW"> <product>hisuite:4.0.5.300_ove</product> </cve> <cve id="CVE-2016-8275" level="MEDIUM"> <product>anyoffice:v200r006c00</product> </cve> <cve id="CVE-2016-8274" level="LOW"> <product>hisuite:4.0.5.300_ove</product> </cve> <cve id="CVE-2016-8277" level="LOW"> <product>usg9520:v300r001c01</product> <product>usg9560:v300r001c01</product> <product>usg9580:v300r001c01</product> </cve> <cve id="CVE-2016-8276" level="MEDIUM"> <product>usg2100:v300r001c00</product> <product>usg2100:v300r001c10</product> <product>usg2200:v300r001c00</product> <product>usg2200:v300r001c10</product> <product>usg5100:v300r001c00</product> <product>usg5100:v300r001c10</product> <product>usg5500:v300r001c00</product> <product>usg5500:v300r001c10</product> </cve> <cve id="CVE-2016-8279" level="MEDIUM"> <product>honor6_firmware:6.9</product> <product>mate_s_firmware:crr-cl00</product> <product>mate_s_firmware:crr-cl20</product> <product>mate_s_firmware:crr-tl00</product> <product>mate_s_firmware:crr-ul20</product> <product>p8_firmware:gra-cl00</product> <product>p8_firmware:gra-tl00</product> <product>p8_firmware:gra-ul00</product> <product>p8_firmware:gra-ul10</product> </cve> <cve id="CVE-2016-8278" level="LOW"> <product>usg9520:v300r001c01</product> <product>usg9560:v300r001c01</product> <product>usg9580:v300r001c01</product> </cve> <cve id="CVE-2016-10039" level="LOW"> <product>modx_revolution:2.5.1-pl</product> </cve> <cve id="CVE-2016-10038" level="LOW"> <product>modx_revolution:2.5.1-pl</product> </cve> <cve id="CVE-2016-10037" level="LOW"> <product>modx_revolution:2.5.1-pl</product> </cve> <cve id="CVE-2016-10034" level="LOW"> <product>zend-mail:2.4.10</product> <product>zend-mail:2.5.0</product> <product>zend-mail:2.5.1</product> <product>zend-mail:2.5.2</product> <product>zend-mail:2.6.0</product> <product>zend-mail:2.6.1</product> <product>zend-mail:2.6.2</product> <product>zend-mail:2.7.0</product> <product>zend-mail:2.7.1</product> <product>zend_framework:2.4.10</product> </cve> <cve id="CVE-2016-10033" level="LOW"> <product>phpmailer:5.2.17</product> </cve> <cve id="CVE-2016-10031" level="MEDIUM"> <product>wampserver:3.0.6</product> </cve> <cve id="CVE-2016-10030" level="HIGH"> <product>slurm:15.08.12</product> <product>slurm:16.05.0</product> <product>slurm:16.05.0</product> <product>slurm:16.05.0</product> <product>slurm:16.05.0</product> <product>slurm:16.05.0</product> <product>slurm:16.05.1</product> <product>slurm:16.05.2</product> <product>slurm:16.05.3</product> <product>slurm:16.05.4</product> <product>slurm:16.05.5</product> <product>slurm:16.05.6</product> <product>slurm:17.02.0</product> <product>slurm:17.02.0</product> <product>slurm:17.02.0</product> </cve> <cve id="CVE-2016-10521" level="LOW"> <product>jshamcrest</product> </cve> <cve id="CVE-2016-10520" level="LOW"> <product>jadedown</product> </cve> <cve id="CVE-2016-10525" level="LOW"> <product>hapi-auth-jwt2:5.1.1</product> </cve> <cve id="CVE-2016-10527" level="LOW"> <product>riot-compiler:2.3.21</product> </cve> <cve id="CVE-2016-4362" level="LOW"> <product>insight_control_server_deployment:-</product> </cve> <cve id="CVE-2016-2509" level="MEDIUM"> <product>hirschmann_l2b:-</product> <product>hirschmann_firmware:05.3.06</product> <product>hirschmann_firmware:09.0.05</product> </cve> <cve id="CVE-2016-1319" level="LOW"> <product>unified_communications_manager:9.1%5c%282.10000.28%5c%29</product> <product>unified_communications_manager:10.5%5c%282.10000.5%5c%29</product> <product>unified_communications_manager:10.5%5c%282.12901.1%5c%29</product> <product>unified_communications_manager:11.0%5c%281.10000.10%5c%29</product> <product>unified_communications_manager_im_and_presence_service:10.5%5c%282%5c%29</product> <product>unified_contact_center_express:11.0%5c%281%5c%29</product> <product>unity_connection:10.5%5c%282%5c%29</product> </cve> <cve id="CVE-2016-1318" level="MEDIUM"> <product>application_policy_infrastructure_controller_enterprise_module:1.1_base</product> </cve> <cve id="CVE-2016-1315" level="LOW"> <product>email_security_appliance_firmeware:9.1.0-032</product> <product>email_security_appliance_firmeware:9.5.0-201</product> <product>email_security_appliance_firmeware:9.6.0-051</product> <product>email_security_appliance_firmeware:9.7.0-125</product> <product>email_security_appliance_firmeware:9.7.0-782</product> </cve> <cve id="CVE-2016-1314" level="MEDIUM"> <product>unified_communications_domain_manager:8.1%5c%28.1%5c%29</product> </cve> <cve id="CVE-2016-1317" level="LOW"> <product>unified_communications_manager:11.5%5c%280.98000.480%5c%29</product> </cve> <cve id="CVE-2016-1316" level="LOW"> <product>telepresence_video_communication_server_software:x8.1.1</product> <product>telepresence_video_communication_server_software:x8.1.2</product> <product>telepresence_video_communication_server_software:x8.1_base</product> <product>telepresence_video_communication_server_software:x8.2.1</product> <product>telepresence_video_communication_server_software:x8.2.2</product> <product>telepresence_video_communication_server_software:x8.2_base</product> <product>telepresence_video_communication_server_software:x8.5.0</product> <product>telepresence_video_communication_server_software:x8.5.1</product> <product>telepresence_video_communication_server_software:x8.5.2</product> <product>telepresence_video_communication_server_software:x8.5.3</product> <product>telepresence_video_communication_server_software:x8.6.0</product> <product>telepresence_video_communication_server_software:x8.6.1</product> <product>telepresence_video_communication_server_software:x8.7_base</product> </cve> <cve id="CVE-2016-1311" level="MEDIUM"> <product>jabber_guest:10.6.8</product> </cve> <cve id="CVE-2016-1310" level="MEDIUM"> <product>unity_connection:11.5%5c%280.199%5c%29</product> </cve> <cve id="CVE-2016-1313" level="LOW"> <product>ucs_invicta_c3124sa_appliance:4.3.1</product> <product>ucs_invicta_c3124sa_appliance:4.5.0</product> <product>ucs_invicta_c3124sa_appliance:5.0.1</product> </cve> <cve id="CVE-2016-1312" level="LOW"> <product>asa_5500_csc-ssm_firmware:6.6.1125.0</product> </cve> <cve id="CVE-2016-10503" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-10501" level="LOW"> <product>fsm9055_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10055" level="MEDIUM"> <product>imagemagick:6.9.5-7</product> </cve> <cve id="CVE-2016-10054" level="MEDIUM"> <product>imagemagick:6.9.5-7</product> </cve> <cve id="CVE-2016-10505" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-10056" level="MEDIUM"> <product>imagemagick:6.9.5-7</product> </cve> <cve id="CVE-2016-5417" level="LOW"> <product>glibc:2.23</product> </cve> <cve id="CVE-2016-5414" level="LOW"> <product>freeipa:4.4.0</product> </cve> <cve id="CVE-2016-5411" level="LOW"> <product>quickstart_cloud_installer:0.9</product> </cve> <cve id="CVE-2016-6268" level="LOW"> <product>smart_protection_server:2.5</product> <product>smart_protection_server:2.6</product> <product>smart_protection_server:3.0</product> </cve> <cve id="CVE-2016-6269" level="LOW"> <product>smart_protection_server:2.5</product> <product>smart_protection_server:2.6</product> <product>smart_protection_server:3.0</product> </cve> <cve id="CVE-2016-6264" level="LOW"> <product>uclibc-ng:1.0.15</product> </cve> <cve id="CVE-2016-6265" level="MEDIUM"> <product>mupdf:1.9</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-6266" level="LOW"> <product>smart_protection_server:2.5</product> <product>smart_protection_server:2.6</product> <product>smart_protection_server:3.0</product> </cve> <cve id="CVE-2016-6267" level="LOW"> <product>smart_protection_server:2.5</product> <product>smart_protection_server:2.6</product> <product>smart_protection_server:3.0</product> </cve> <cve id="CVE-2016-6263" level="LOW"> <product>libidn:1.32</product> </cve> <cve id="CVE-2016-6199" level="LOW"> <product>gradle:2.12</product> </cve> <cve id="CVE-2016-6192" level="MEDIUM"> <product>p8_smartphone_firmware:gra-cl00c92b350</product> </cve> <cve id="CVE-2016-6193" level="MEDIUM"> <product>p8_smartphone_firmware:gra-cl00c92b350</product> </cve> <cve id="CVE-2016-6190" level="LOW"> <product>sogo:2.3.11</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.1</product> <product>sogo:3.0.2</product> <product>sogo:3.1.0</product> </cve> <cve id="CVE-2016-6191" level="MEDIUM"> <product>sogo:3.1.2</product> </cve> <cve id="CVE-2016-6195" level="LOW"> <product>vbulletin:4.2.2</product> <product>vbulletin:4.2.3</product> </cve> <cve id="CVE-2016-8602" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-5515" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-6993" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6996" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6997" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6994" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6995" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6998" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6999" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3259" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0697" level="HIGH"> <product>application_object_library:12.1.3</product> <product>application_object_library:12.2.3</product> <product>application_object_library:12.2.4</product> <product>application_object_library:12.2.5</product> </cve> <cve id="CVE-2016-0694" level="MEDIUM"> <product>oracle_berkeley_db:11.2.5.0.32</product> <product>oracle_berkeley_db:11.2.5.1.29</product> <product>oracle_berkeley_db:11.2.5.2.42</product> <product>oracle_berkeley_db:11.2.5.3.28</product> <product>oracle_berkeley_db:12.1.6.0.35</product> <product>oracle_berkeley_db:12.1.6.1.26</product> </cve> <cve id="CVE-2016-0692" level="MEDIUM"> <product>oracle_berkeley_db:11.2.5.0.32</product> <product>oracle_berkeley_db:11.2.5.1.29</product> <product>oracle_berkeley_db:11.2.5.2.42</product> <product>oracle_berkeley_db:11.2.5.3.28</product> <product>oracle_berkeley_db:12.1.6.0.35</product> <product>oracle_berkeley_db:12.1.6.1.26</product> </cve> <cve id="CVE-2016-0691" level="LOW"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-0690" level="LOW"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-0699" level="LOW"> <product>flexcube_direct_banking:12.0.2</product> <product>flexcube_direct_banking:12.0.3</product> </cve> <cve id="CVE-2016-0698" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-1070" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1071" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1072" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1073" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1074" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1075" level="LOW"> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>acrobat_xi:11.0.15</product> <product>reader_xi:11.0.15</product> </cve> <cve id="CVE-2016-1076" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1077" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1078" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1079" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-10193" level="LOW"> <product>espeak-ruby:1.0.2</product> </cve> <cve id="CVE-2016-10194" level="LOW"> <product>festivaltts4r:</product> </cve> <cve id="CVE-2016-9303" level="LOW"> <product>fbx_software_development_kit:2017.0</product> </cve> <cve id="CVE-2016-9315" level="LOW"> <product>interscan_web_security_virtual_appliance:6.5</product> </cve> <cve id="CVE-2016-9314" level="LOW"> <product>interscan_web_security_virtual_appliance:6.5</product> </cve> <cve id="CVE-2016-9317" level="MEDIUM"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-9316" level="MEDIUM"> <product>interscan_web_security_virtual_appliance:6.5</product> </cve> <cve id="CVE-2016-9319" level="MEDIUM"> <product>mobile_security:9.7</product> </cve> <cve id="CVE-2016-9318" level="MEDIUM"> <product>libxml2:2.9.4</product> </cve> <cve id="CVE-2016-5310" level="MEDIUM"> <product>advanced_threat_protection:-</product> <product>csapi:10.0.4</product> <product>data_center_security_server:-</product> <product>email_security.cloud:-</product> <product>endpoint_protection:12.1.4</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection_cloud:-</product> <product>endpoint_protection_cloud:-</product> <product>endpoint_protection_for_small_business:-</product> <product>endpoint_protection_for_small_business:12.1</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.2</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0</product> <product>mail_security_for_microsoft_exchange:7.0.1</product> <product>mail_security_for_microsoft_exchange:7.0.2</product> <product>mail_security_for_microsoft_exchange:7.0.3</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5</product> <product>mail_security_for_microsoft_exchange:7.5.1</product> <product>mail_security_for_microsoft_exchange:7.5.2</product> <product>mail_security_for_microsoft_exchange:7.5.3</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>messaging_gateway:10.6.1</product> <product>messaging_gateway_for_service_providers:10.5</product> <product>messaging_gateway_for_service_providers:10.6</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.0</product> <product>protection_engine:7.5.1</product> <product>protection_engine:7.5.2</product> <product>protection_engine:7.5.3</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.5.5</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.0.3</product> <product>protection_for_sharepoint_servers:6.0.4</product> <product>protection_for_sharepoint_servers:6.0.5</product> <product>protection_for_sharepoint_servers:6.0.6</product> <product>protection_for_sharepoint_servers:6.0.7</product> <product>web_gateway:-</product> <product>web_security.cloud:-</product> </cve> <cve id="CVE-2016-5313" level="LOW"> <product>web_gateway:5.2.2</product> </cve> <cve id="CVE-2016-5312" level="LOW"> <product>messaging_gateway:10.6.1</product> </cve> <cve id="CVE-2016-5317" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5316" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5319" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-5318" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-0433" level="MEDIUM"> <product>fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-0432" level="MEDIUM"> <product>fusion_middleware:8.5.0</product> <product>fusion_middleware:8.5.1</product> <product>fusion_middleware:8.5.2</product> </cve> <cve id="CVE-2016-7422" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-1339" level="LOW"> <product>unified_computing_system_platform_emulator:2.5%282%29ts4</product> <product>unified_computing_system_platform_emulator:3.0%282c%29a</product> <product>unified_computing_system_platform_emulator:3.0%282c%29ts9</product> </cve> <cve id="CVE-2016-1338" level="LOW"> <product>telepresence_video_communication_server_software:x8.5.1</product> <product>telepresence_video_communication_server_software:x8.5.2</product> </cve> <cve id="CVE-2016-1210" level="MEDIUM"> <product>105_bank:1.0</product> <product>105_bank:1.0</product> <product>105_bank:1.1</product> </cve> <cve id="CVE-2016-4995" level="MEDIUM"> <product>foreman:1.11.3</product> <product>foreman:1.12.0</product> </cve> <cve id="CVE-2016-4332" level="MEDIUM"> <product>hdf5:1.8.16</product> </cve> <cve id="CVE-2016-1213" level="MEDIUM"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-1742" level="LOW"> <product>itunes:12.3.1</product> </cve> <cve id="CVE-2016-1215" level="MEDIUM"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-2332" level="LOW"> <product>syslink_sl-1000_modular_gateway_firmware:-</product> </cve> <cve id="CVE-2016-2333" level="LOW"> <product>syslink_sl-1000_modular_gateway_firmware:-</product> </cve> <cve id="CVE-2016-2331" level="LOW"> <product>syslink_sl-1000_modular_gateway_firmware:-</product> </cve> <cve id="CVE-2016-2336" level="LOW"> <product>ruby:2.2.2</product> <product>ruby:2.3.0</product> </cve> <cve id="CVE-2016-2337" level="LOW"> <product>ruby:2.2.2</product> <product>ruby:2.3.0</product> </cve> <cve id="CVE-2016-1337" level="MEDIUM"> <product>epc3928_firmware:-</product> </cve> <cve id="CVE-2016-2339" level="LOW"> <product>ruby:2.2.2</product> <product>ruby:2.3.0</product> </cve> <cve id="CVE-2016-1336" level="LOW"> <product>epc3928_firmware:-</product> </cve> <cve id="CVE-2016-1218" level="LOW"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-0614" level="LOW"> <product>business_intelligence_publisher:11.1.1.7.0</product> <product>business_intelligence_publisher:11.1.1.9.0</product> <product>business_intelligence_publisher:12.2.1.0.0</product> </cve> <cve id="CVE-2016-8869" level="LOW"> <product>joomla%21:3.6.3</product> </cve> <cve id="CVE-2016-8860" level="LOW"> <product>tor:0.2.8.8</product> <product>tor:0.2.9.0</product> <product>tor:0.2.9.1</product> <product>tor:0.2.9.2</product> <product>tor:0.2.9.3</product> </cve> <cve id="CVE-2016-3035" level="LOW"> <product>security_appscan_source:9.0.1</product> <product>security_appscan_source:9.0.2</product> <product>security_appscan_source:9.0.3</product> </cve> <cve id="CVE-2016-8864" level="LOW"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5-p2</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.1p1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2b1</product> <product>bind:9.7.2rc1</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> </cve> <cve id="CVE-2016-8866" level="MEDIUM"> <product>imagemagick:7.0.3-7</product> <product>leap:42.1</product> <product>leap:42.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-8867" level="LOW"> <product>docker:1.12.2</product> </cve> <cve id="CVE-2016-6031" level="MEDIUM"> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> </cve> <cve id="CVE-2016-6522" level="LOW"> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6521" level="MEDIUM"> <product>grails:1.5.9</product> <product>grails:2.0.6</product> </cve> <cve id="CVE-2016-6520" level="LOW"> <product>imagemagick:7.0.2-6</product> </cve> <cve id="CVE-2016-6527" level="MEDIUM"> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> </cve> <cve id="CVE-2016-6526" level="MEDIUM"> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> </cve> <cve id="CVE-2016-6037" level="MEDIUM"> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-6036" level="MEDIUM"> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> </cve> <cve id="CVE-2016-6039" level="MEDIUM"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-6038" level="LOW"> <product>aix:5.3</product> <product>aix:6.1</product> <product>aix:7.1</product> </cve> <cve id="CVE-2016-3009" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-3008" level="MEDIUM"> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-6417" level="MEDIUM"> <product>firesight_system_software:4.10.2</product> <product>firesight_system_software:4.10.2.1</product> <product>firesight_system_software:4.10.2.2</product> <product>firesight_system_software:4.10.2.3</product> <product>firesight_system_software:4.10.2.4</product> <product>firesight_system_software:4.10.2.5</product> <product>firesight_system_software:4.10.3</product> <product>firesight_system_software:4.10.3.1</product> <product>firesight_system_software:4.10.3.2</product> <product>firesight_system_software:4.10.3.3</product> <product>firesight_system_software:4.10.3.4</product> <product>firesight_system_software:4.10.3.5</product> <product>firesight_system_software:4.10.3.6</product> <product>firesight_system_software:4.10.3.7</product> <product>firesight_system_software:4.10.3.8</product> <product>firesight_system_software:4.10.3.9</product> <product>firesight_system_software:4.10.3.10</product> <product>firesight_system_software:5.1.0</product> <product>firesight_system_software:5.1.0.1</product> <product>firesight_system_software:5.1.0.2</product> <product>firesight_system_software:5.1.0.3</product> <product>firesight_system_software:5.1.1</product> <product>firesight_system_software:5.1.1.1</product> <product>firesight_system_software:5.1.1.2</product> <product>firesight_system_software:5.1.1.3</product> <product>firesight_system_software:5.1.1.4</product> <product>firesight_system_software:5.1.1.5</product> <product>firesight_system_software:5.1.1.6</product> <product>firesight_system_software:5.1.1.8</product> <product>firesight_system_software:5.1.1.9</product> <product>firesight_system_software:5.1.1.10</product> <product>firesight_system_software:5.1.1.11</product> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.2.0.1</product> <product>firesight_system_software:5.2.0.2</product> <product>firesight_system_software:5.2.0.3</product> <product>firesight_system_software:5.2.0.4</product> <product>firesight_system_software:5.2.0.5</product> <product>firesight_system_software:5.2.0.6</product> <product>firesight_system_software:5.2.0.8</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.0.1</product> <product>firesight_system_software:5.3.0.2</product> <product>firesight_system_software:5.3.0.3</product> <product>firesight_system_software:5.3.0.4</product> <product>firesight_system_software:5.3.0.5</product> <product>firesight_system_software:5.3.0.6</product> <product>firesight_system_software:5.3.0.7</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.3.1.1</product> <product>firesight_system_software:5.3.1.2</product> <product>firesight_system_software:5.3.1.3</product> <product>firesight_system_software:5.3.1.4</product> <product>firesight_system_software:5.3.1.5</product> <product>firesight_system_software:5.3.1.7</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> <product>firesight_system_software:5.4.0.4</product> <product>firesight_system_software:5.4.0.5</product> <product>firesight_system_software:5.4.0.6</product> <product>firesight_system_software:5.4.1</product> <product>firesight_system_software:5.4.1.2</product> <product>firesight_system_software:5.4.1.3</product> <product>firesight_system_software:5.4.1.4</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> <product>firesight_system_software:6.1.0</product> </cve> <cve id="CVE-2016-6416" level="MEDIUM"> <product>content_security_management_appliance:9.1.0</product> <product>content_security_management_appliance:9.1.0-004</product> <product>content_security_management_appliance:9.1.0-031</product> <product>content_security_management_appliance:9.1.0-033</product> <product>content_security_management_appliance:9.1.0-103</product> <product>content_security_management_appliance:9.5.0</product> <product>content_security_management_appliance:9.6.0</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.1-066</product> <product>email_security_appliance:9.9.6-026</product> <product>email_security_appliance:9.9_base</product> <product>web_security_appliance:9.0.0-162</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1.0-070</product> <product>web_security_appliance:9.1_base</product> <product>web_security_appliance:9.5.0-235</product> <product>web_security_appliance:9.5.0-284</product> <product>web_security_appliance:9.5.0-444</product> <product>web_security_appliance:9.5_base</product> </cve> <cve id="CVE-2016-6419" level="MEDIUM"> <product>firepower_management_center:4.10.3</product> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.4.0</product> </cve> <cve id="CVE-2016-6418" level="MEDIUM"> <product>videoscape_distribution_suite_service_manager:3.0.0</product> <product>videoscape_distribution_suite_service_manager:3.0_base</product> <product>videoscape_distribution_suite_service_manager:3.1.0</product> <product>videoscape_distribution_suite_service_manager:3.1_base</product> <product>videoscape_distribution_suite_service_manager:3.2.0</product> <product>videoscape_distribution_suite_service_manager:3.3.0</product> <product>videoscape_distribution_suite_service_manager:3.3_base</product> <product>videoscape_distribution_suite_service_manager:3.4.0</product> <product>videoscape_distribution_suite_service_manager:3.4_base</product> </cve> <cve id="CVE-2016-3031" level="MEDIUM"> <product>cognos_analytics:11.0.0.0</product> <product>cognos_analytics:11.0.1.0</product> <product>cognos_analytics:11.0.2.0</product> <product>cognos_analytics:11.0.3.0</product> <product>cognos_analytics:11.0.4.0</product> </cve> <cve id="CVE-2016-8781" level="LOW"> <product>secospace_usg6300_firmware:v500r001c20</product> <product>secospace_usg6300_firmware:v500r001c20spc200pwe</product> <product>secospace_usg6500_firmware:v500r001c20</product> <product>secospace_usg6600_firmware:v500r001c20</product> <product>secospace_usg6600_firmware:v500r001c20spc200pwe</product> </cve> <cve id="CVE-2016-8780" level="LOW"> <product>cloudengine_12800_firmware:v100r006c00</product> <product>cloudengine_6800_firmware:v100r006c00</product> <product>cloudengine_7800_firmware:v100r006c00</product> <product>cloudengine_8800_firmware:v100r006c00</product> </cve> <cve id="CVE-2016-8783" level="MEDIUM"> <product>honor_6_firmware:h60-l01c00b850</product> </cve> <cve id="CVE-2016-8782" level="LOW"> <product>cloudengine_12800_firmware:v100r003c00</product> <product>cloudengine_12800_firmware:v100r003c10</product> <product>cloudengine_12800_firmware:v100r005c00</product> <product>cloudengine_12800_firmware:v100r005c10</product> <product>cloudengine_12800_firmware:v100r006c00</product> </cve> <cve id="CVE-2016-7928" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7929" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-8786" level="LOW"> <product>s12700_firmware:v200r005c00</product> <product>s12700_firmware:v200r006c00</product> <product>s12700_firmware:v200r007c00</product> <product>s12700_firmware:v200r008c00</product> <product>s5700_firmware:v200r006c00</product> <product>s5700_firmware:v200r007c00</product> <product>s5700_firmware:v200r008c00</product> <product>s6700_firmware:v200r008c00</product> <product>s7700_firmware:v200r001c00</product> <product>s7700_firmware:v200r002c00</product> <product>s7700_firmware:v200r003c00</product> <product>s7700_firmware:v200r005c00</product> <product>s7700_firmware:v200r006c00</product> <product>s7700_firmware:v200r007c00</product> <product>s7700_firmware:v200r008c00</product> <product>s9700_firmware:v200r001c00</product> <product>s9700_firmware:v200r002c00</product> <product>s9700_firmware:v200r003c00</product> <product>s9700_firmware:v200r005c00</product> <product>s9700_firmware:v200r006c00</product> <product>s9700_firmware:v200r007c00</product> <product>s9700_firmware:v200r008c00</product> </cve> <cve id="CVE-2016-8789" level="MEDIUM"> <product>espace_integrated_access_device_firmware:v300r001c03</product> <product>espace_integrated_access_device_firmware:v300r001c04</product> <product>espace_integrated_access_device_firmware:v300r001c06</product> <product>espace_integrated_access_device_firmware:v300r001c07</product> <product>espace_integrated_access_device_firmware:v300r001c20</product> </cve> <cve id="CVE-2016-7925" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0206" level="LOW"> <product>cloud_orchestrator:2.3</product> <product>cloud_orchestrator:2.3.0.1</product> <product>cloud_orchestrator:2.4</product> <product>cloud_orchestrator:2.4.0.1</product> <product>cloud_orchestrator:2.4.0.2</product> </cve> <cve id="CVE-2016-7927" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0200" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0201" level="MEDIUM"> <product>security_network_protection_firmware:5.3.1</product> <product>security_network_protection_firmware:5.3.2</product> </cve> <cve id="CVE-2016-0202" level="LOW"> <product>cloud_orchestrator:2.3</product> <product>cloud_orchestrator:2.3.0.1</product> <product>cloud_orchestrator:2.4</product> <product>cloud_orchestrator:2.4.0.1</product> <product>cloud_orchestrator:2.4.0.2</product> <product>cloud_orchestrator:2.4.0.3</product> </cve> <cve id="CVE-2016-7923" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-4969" level="MEDIUM"> <product>fortiwan:4.2.4</product> </cve> <cve id="CVE-2016-4968" level="LOW"> <product>fortiwan:4.2.4</product> </cve> <cve id="CVE-2016-4961" level="LOW"> <product>geforce_experience:-</product> </cve> <cve id="CVE-2016-4960" level="MEDIUM"> <product>geforce_experience:-</product> </cve> <cve id="CVE-2016-4963" level="MEDIUM"> <product>xen:4.0.0</product> <product>xen:4.0.1</product> <product>xen:4.0.2</product> <product>xen:4.0.3</product> <product>xen:4.0.4</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.1.6</product> <product>xen:4.1.6.1</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.2.4</product> <product>xen:4.2.5</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-4962" level="LOW"> <product>vm_server:3.3</product> <product>vm_server:3.4</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-4965" level="LOW"> <product>fortiwan:4.2.4</product> </cve> <cve id="CVE-2016-4964" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-4967" level="LOW"> <product>fortiwan:4.2.4</product> </cve> <cve id="CVE-2016-4966" level="LOW"> <product>fortiwan:4.2.4</product> </cve> <cve id="CVE-2016-0068" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0069" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0060" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0061" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0062" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0063" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0064" level="MEDIUM"> <product>internet_explorer:10</product> </cve> <cve id="CVE-2016-0067" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-10059" level="MEDIUM"> <product>imagemagick:6.9.4-0</product> </cve> <cve id="CVE-2016-10058" level="MEDIUM"> <product>imagemagick:6.9.6-2</product> </cve> <cve id="CVE-2016-10509" level="LOW"> <product>opencart:2.3.0.0</product> </cve> <cve id="CVE-2016-10508" level="MEDIUM"> <product>phpthumb:1.7.13</product> </cve> <cve id="CVE-2016-10051" level="MEDIUM"> <product>imagemagick:6.9.5-5</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-10050" level="MEDIUM"> <product>imagemagick:6.9.4-8</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-10053" level="MEDIUM"> <product>imagemagick:6.9.5-7</product> </cve> <cve id="CVE-2016-10052" level="MEDIUM"> <product>imagemagick:6.9.5-5</product> </cve> <cve id="CVE-2016-10507" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-10506" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-10057" level="MEDIUM"> <product>imagemagick:6.9.5-7</product> </cve> <cve id="CVE-2016-10504" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-3038" level="MEDIUM"> <product>cognos_business_intelligence:10.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-8529" level="LOW"> <product>lefthand:12.5</product> </cve> <cve id="CVE-2016-8528" level="LOW"> <product>eucalyptus:3.3.0</product> <product>eucalyptus:3.3.1</product> <product>eucalyptus:3.3.2</product> <product>eucalyptus:3.4.0</product> <product>eucalyptus:3.4.1</product> <product>eucalyptus:3.4.2</product> <product>eucalyptus:3.4.3</product> <product>eucalyptus:4.0.0</product> <product>eucalyptus:4.0.1</product> <product>eucalyptus:4.0.2</product> <product>eucalyptus:4.1.0</product> <product>eucalyptus:4.1.1</product> <product>eucalyptus:4.1.2</product> <product>eucalyptus:4.2.0</product> </cve> <cve id="CVE-2016-8525" level="LOW"> <product>intelligent_management_center:7.2</product> <product>intelligent_management_center:7.2</product> </cve> <cve id="CVE-2016-8521" level="MEDIUM"> <product>diagnostics:9.24</product> <product>diagnostics:9.26</product> <product>diagnostics:9.26</product> </cve> <cve id="CVE-2016-8520" level="LOW"> <product>eucalyptus:4.3.0</product> </cve> <cve id="CVE-2016-8522" level="MEDIUM"> <product>diagnostics:9.24</product> <product>diagnostics:9.26</product> <product>diagnostics:9.26</product> </cve> <cve id="CVE-2016-9128" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9129" level="LOW"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9126" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9127" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9124" level="LOW"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9125" level="LOW"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9122" level="LOW"> <product>go-jose:1.0.3</product> </cve> <cve id="CVE-2016-9123" level="LOW"> <product>go-jose:1.0.4</product> </cve> <cve id="CVE-2016-9121" level="LOW"> <product>go-jose:1.0.3</product> </cve> <cve id="CVE-2016-4785" level="LOW"> <product>siprotec_firmware:-</product> <product>siprotec_firmware:4.26</product> </cve> <cve id="CVE-2016-4784" level="LOW"> <product>siprotec_firmware:-</product> <product>siprotec_firmware:4.26</product> </cve> <cve id="CVE-2016-4787" level="LOW"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.0r9.0</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-4786" level="LOW"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.0r9.0</product> <product>pulse_connect_secure:8.0r10.0</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.1r2.0</product> <product>pulse_connect_secure:8.1r2.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-4783" level="MEDIUM"> <product>shareit:3.5.98_ww</product> </cve> <cve id="CVE-2016-4782" level="MEDIUM"> <product>shareit:3.5.98_ww</product> </cve> <cve id="CVE-2016-1331" level="MEDIUM"> <product>emergency_responder:11.5%5c%280.99833.5%5c%29</product> </cve> <cve id="CVE-2016-4789" level="MEDIUM"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-4788" level="LOW"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.0r9.0</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-1335" level="HIGH"> <product>asr_5000_series_software:16.5.2</product> <product>asr_5000_series_software:17.7.0</product> <product>asr_5000_series_software:18.4.0</product> <product>asr_5000_series_software:19.0.1</product> <product>asr_5000_series_software:19.3.0</product> <product>asr_5000_series_software:20.0.0</product> </cve> <cve id="CVE-2016-1334" level="LOW"> <product>small_business_wireless_access_points_firmware:1.0.4.4</product> </cve> <cve id="CVE-2016-2783" level="LOW"> <product>vsp_operating_system_software:4.2.2.0</product> <product>vsp_operating_system_software:5.0.0.0</product> </cve> <cve id="CVE-2016-2781" level="LOW"> <product>coreutils</product> </cve> <cve id="CVE-2016-2780" level="LOW"> <product>utps_firmware:23.009.09.00.983</product> </cve> <cve id="CVE-2016-2787" level="LOW"> <product>puppet_enterprise:2015.3</product> <product>puppet_enterprise:2015.3.2</product> </cve> <cve id="CVE-2016-2786" level="LOW"> <product>puppet_agent:1.3.0</product> <product>puppet_agent:1.3.1</product> <product>puppet_agent:1.3.2</product> <product>puppet_agent:1.3.4</product> <product>puppet_agent:1.3.5</product> <product>puppet_enterprise:2015.3</product> <product>puppet_enterprise:2015.3.2</product> </cve> <cve id="CVE-2016-2785" level="LOW"> <product>puppet:4.0.0</product> <product>puppet:4.0.0</product> <product>puppet:4.0.0</product> <product>puppet:4.0.0</product> <product>puppet:4.1.0</product> <product>puppet:4.2.0</product> <product>puppet:4.2.1</product> <product>puppet:4.2.2</product> <product>puppet:4.2.3</product> <product>puppet:4.3.0</product> <product>puppet:4.3.1</product> <product>puppet:4.3.2</product> <product>puppet:4.4.0</product> <product>puppet:4.4.1</product> <product>puppet_agent:1.4.1</product> <product>puppet_server:2.0</product> <product>puppet_server:2.1</product> <product>puppet_server:2.1.1</product> <product>puppet_server:2.1.2</product> <product>puppet_server:2.2.0</product> <product>puppet_server:2.3.0</product> <product>puppet_server:2.3.1</product> </cve> <cve id="CVE-2016-2784" level="HIGH"> <product>cms_made_simple:1.0</product> <product>cms_made_simple:1.0.1</product> <product>cms_made_simple:1.0.2</product> <product>cms_made_simple:1.0.3</product> <product>cms_made_simple:1.0.4</product> <product>cms_made_simple:1.0.5</product> <product>cms_made_simple:1.0.6</product> <product>cms_made_simple:1.0.7</product> <product>cms_made_simple:1.0.8</product> <product>cms_made_simple:1.1</product> <product>cms_made_simple:1.1.1</product> <product>cms_made_simple:1.1.2</product> <product>cms_made_simple:1.1.3.1</product> <product>cms_made_simple:1.1.4.1</product> <product>cms_made_simple:1.2</product> <product>cms_made_simple:1.2.1</product> <product>cms_made_simple:1.2.2</product> <product>cms_made_simple:1.2.3</product> <product>cms_made_simple:1.2.4</product> <product>cms_made_simple:1.2.5</product> <product>cms_made_simple:1.3</product> <product>cms_made_simple:1.3.1</product> <product>cms_made_simple:1.4</product> <product>cms_made_simple:1.4.1</product> <product>cms_made_simple:1.5</product> <product>cms_made_simple:1.5.1</product> <product>cms_made_simple:1.5.2</product> <product>cms_made_simple:1.5.3</product> <product>cms_made_simple:1.5.4</product> <product>cms_made_simple:1.6</product> <product>cms_made_simple:1.6.1</product> <product>cms_made_simple:1.6.2</product> <product>cms_made_simple:1.6.3</product> <product>cms_made_simple:1.6.4</product> <product>cms_made_simple:1.6.5</product> <product>cms_made_simple:1.6.6</product> <product>cms_made_simple:1.6.7</product> <product>cms_made_simple:1.6.8</product> <product>cms_made_simple:1.6.9</product> <product>cms_made_simple:1.6.10</product> <product>cms_made_simple:1.7</product> <product>cms_made_simple:1.7.1</product> <product>cms_made_simple:1.8</product> <product>cms_made_simple:1.8.1</product> <product>cms_made_simple:1.8.2</product> <product>cms_made_simple:1.9</product> <product>cms_made_simple:1.9.1</product> <product>cms_made_simple:1.9.2</product> <product>cms_made_simple:1.9.3</product> <product>cms_made_simple:1.9.4</product> <product>cms_made_simple:1.9.4.1</product> <product>cms_made_simple:1.9.4.2</product> <product>cms_made_simple:1.9.4.3</product> <product>cms_made_simple:1.10</product> <product>cms_made_simple:1.10.1</product> <product>cms_made_simple:1.10.2</product> <product>cms_made_simple:1.10.3</product> <product>cms_made_simple:1.11</product> <product>cms_made_simple:1.11.1</product> <product>cms_made_simple:1.11.2</product> <product>cms_made_simple:1.11.2.1</product> <product>cms_made_simple:1.11.3</product> <product>cms_made_simple:1.11.4</product> <product>cms_made_simple:1.11.5</product> <product>cms_made_simple:1.11.6</product> <product>cms_made_simple:1.11.7</product> <product>cms_made_simple:1.11.8</product> <product>cms_made_simple:1.11.9</product> <product>cms_made_simple:1.11.10</product> <product>cms_made_simple:1.11.11</product> <product>cms_made_simple:1.11.12</product> <product>cms_made_simple:1.11.13</product> <product>cms_made_simple:1.12</product> <product>cms_made_simple:1.12.1</product> <product>cms_made_simple:2.0</product> <product>cms_made_simple:2.0.1</product> <product>cms_made_simple:2.0.1.1</product> <product>cms_made_simple:2.1</product> <product>cms_made_simple:2.1.1</product> <product>cms_made_simple:2.1.2</product> </cve> <cve id="CVE-2016-2789" level="MEDIUM"> <product>xenmobile_server:10.0</product> <product>xenmobile_server:10.1</product> <product>xenmobile_server:10.3</product> </cve> <cve id="CVE-2016-2788" level="LOW"> <product>marionette-collective:2.7.0</product> <product>marionette-collective:2.8.0</product> <product>marionette-collective:2.8.1</product> <product>marionette-collective:2.8.2</product> <product>marionette-collective:2.8.3</product> <product>marionette-collective:2.8.4</product> <product>marionette-collective:2.8.5</product> <product>marionette-collective:2.8.6</product> <product>marionette-collective:2.8.7</product> <product>marionette-collective:2.8.8</product> <product>puppet:3.8</product> <product>puppet:2016.2</product> </cve> <cve id="CVE-2016-5788" level="LOW"> <product>bently_nevada_3500%2f22m_serial_firmware:-</product> <product>bently_nevada_3500%2f22m_usb_firmware:-</product> </cve> <cve id="CVE-2016-5789" level="MEDIUM"> <product>jtc-200_firmware</product> </cve> <cve id="CVE-2016-5786" level="LOW"> <product>omniview:1.2</product> </cve> <cve id="CVE-2016-5787" level="LOW"> <product>cimplicity:8.2</product> </cve> <cve id="CVE-2016-5782" level="LOW"> <product>lgate_firmware:-</product> </cve> <cve id="CVE-2016-5781" level="MEDIUM"> <product>levistudio:-</product> </cve> <cve id="CVE-2016-5434" level="MEDIUM"> <product>pacman:5.0.1</product> </cve> <cve id="CVE-2016-5435" level="MEDIUM"> <product>huawei_firmware:v5500r001c00</product> </cve> <cve id="CVE-2016-5430" level="LOW"> <product>jose-php:2.2.0</product> <product>jose-php:2.3.0</product> </cve> <cve id="CVE-2016-5432" level="LOW"> <product>enterprise_virtualization:4.0</product> </cve> <cve id="CVE-2016-6209" level="MEDIUM"> <product>nagios:-</product> </cve> <cve id="CVE-2016-6201" level="MEDIUM"> <product>ektron_content_management_system:9.10</product> </cve> <cve id="CVE-2016-6206" level="LOW"> <product>ar3200_firmware:v200r001c00</product> <product>ar3200_firmware:v200r001c01</product> <product>ar3200_firmware:v200r002c00</product> <product>ar3200_firmware:v200r002c01</product> <product>ar3200_firmware:v200r002c02</product> <product>ar3200_firmware:v200r002c05</product> <product>ar3200_firmware:v200r003c00</product> <product>ar3200_firmware:v200r003c01</product> <product>ar3200_firmware:v200r003c05</product> <product>ar3200_firmware:v200r005c00</product> <product>ar3200_firmware:v200r005c10</product> <product>ar3200_firmware:v200r005c20</product> <product>ar3200_firmware:v200r005c21</product> <product>ar3200_firmware:v200r005c30</product> <product>ar3200_firmware:v200r005c31</product> <product>ar3200_firmware:v200r005c32</product> <product>ar3200_firmware:v200r006c00</product> <product>ar3200_firmware:v200r006c10</product> <product>ar3200_firmware:v200r006c11</product> <product>ar3200_firmware:v200r006c12</product> <product>ar3200_firmware:v200r006c13</product> <product>ar3200_firmware:v200r006c15</product> <product>ar3200_firmware:v200r006c16</product> <product>ar3200_firmware:v200r006c17</product> </cve> <cve id="CVE-2016-6204" level="MEDIUM"> <product>sinema_remote_connect_server:1.1</product> </cve> <cve id="CVE-2016-7801" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-3498" level="LOW"> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-3490" level="MEDIUM"> <product>transportation_management:6.3.0</product> <product>transportation_management:6.3.1</product> <product>transportation_management:6.3.2</product> <product>transportation_management:6.3.3</product> <product>transportation_management:6.3.4</product> <product>transportation_management:6.3.5</product> <product>transportation_management:6.3.6</product> <product>transportation_management:6.3.7</product> <product>transportation_management:6.4.0</product> <product>transportation_management:6.4.1</product> </cve> <cve id="CVE-2016-3491" level="LOW"> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-3493" level="LOW"> <product>hyperion_financial_reporting:11.1.2.4</product> </cve> <cve id="CVE-2016-3494" level="LOW"> <product>enterprise_manager_ops_center:12.1.4</product> <product>enterprise_manager_ops_center:12.2.2</product> <product>enterprise_manager_ops_center:12.3.2</product> </cve> <cve id="CVE-2016-3496" level="MEDIUM"> <product>enterprise_manager_for_fusion_middleware:11.1.1.7</product> <product>enterprise_manager_for_fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-7007" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7006" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7005" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7004" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7003" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7002" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7553" level="LOW"> <product>buf.pl:2.13</product> </cve> <cve id="CVE-2016-1929" level="LOW"> <product>hana:-</product> </cve> <cve id="CVE-2016-1926" level="MEDIUM"> <product>greenbone_security_assistant:6.0.0</product> <product>greenbone_security_assistant:6.0.1</product> <product>greenbone_security_assistant:6.0.2</product> <product>greenbone_security_assistant:6.0.3</product> <product>greenbone_security_assistant:6.0.4</product> <product>greenbone_security_assistant:6.0.5</product> <product>greenbone_security_assistant:6.0.6</product> <product>greenbone_security_assistant:6.0.7</product> <product>fedora:22</product> <product>fedora:23</product> <product>greenbone_os:3.1.1</product> <product>greenbone_os:3.1.6</product> <product>greenbone_os:3.1.7</product> <product>greenbone_os:3.1.8</product> <product>greenbone_os:3.1.9</product> <product>greenbone_os:3.1.10</product> <product>greenbone_os:3.1.11</product> <product>greenbone_os:3.1.12</product> <product>greenbone_os:3.1.13</product> <product>greenbone_os:3.1.14</product> <product>greenbone_os:3.1.15</product> <product>greenbone_os:3.1.16</product> <product>greenbone_os:3.1.17</product> <product>greenbone_os:3.1.18</product> <product>greenbone_os:3.1.19</product> <product>greenbone_os:3.1.20</product> <product>greenbone_os:3.1.21</product> <product>greenbone_os:3.1.22</product> <product>greenbone_os:3.1.23</product> </cve> <cve id="CVE-2016-1927" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> </cve> <cve id="CVE-2016-1924" level="MEDIUM"> <product>openjpeg:2.1.0</product> </cve> <cve id="CVE-2016-1925" level="LOW"> <product>lha_for_unix:-</product> </cve> <cve id="CVE-2016-1922" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-1923" level="MEDIUM"> <product>openjpeg:2.1.0</product> </cve> <cve id="CVE-2016-1920" level="MEDIUM"> <product>knox:1.0</product> </cve> <cve id="CVE-2016-7008" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-4200" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4201" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4202" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4203" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4204" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4205" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4206" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4207" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4208" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4209" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-3274" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3276" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3277" level="HIGH"> <product>edge:-</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3271" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3273" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3278" level="MEDIUM"> <product>outlook:2010</product> <product>outlook:2013</product> <product>outlook:2016</product> <product>outlook_rt:2013</product> </cve> <cve id="CVE-2016-1568" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-1569" level="LOW"> <product>firebird:2.5.5</product> </cve> <cve id="CVE-2016-4510" level="LOW"> <product>vtscada:8.0.05</product> <product>vtscada:8.0.12</product> <product>vtscada:8.0.16</product> <product>vtscada:8.0.18</product> <product>vtscada:8.1.05</product> <product>vtscada:8.1.06</product> <product>vtscada:9.0.02</product> <product>vtscada:9.0.03</product> <product>vtscada:9.0.08</product> <product>vtscada:9.1.02</product> <product>vtscada:9.1.03</product> <product>vtscada:9.1.05</product> <product>vtscada:9.1.09</product> <product>vtscada:9.1.11</product> <product>vtscada:9.1.14</product> <product>vtscada:9.1.20</product> <product>vtscada:10.0.11</product> <product>vtscada:10.0.13</product> <product>vtscada:10.0.14</product> <product>vtscada:10.0.16</product> <product>vtscada:10.0.17</product> <product>vtscada:10.1.05</product> <product>vtscada:10.1.06</product> <product>vtscada:10.1.07</product> <product>vtscada:10.1.12</product> <product>vtscada:10.2.05</product> <product>vtscada:10.2.07</product> <product>vtscada:10.2.08</product> <product>vtscada:10.2.11</product> <product>vtscada:10.2.13</product> <product>vtscada:10.2.14</product> <product>vtscada:10.2.15</product> <product>vtscada:10.2.17</product> <product>vtscada:10.2.19</product> <product>vtscada:10.2.20</product> <product>vtscada:10.2.21</product> <product>vtscada:10.2.22</product> <product>vtscada:11.0.05</product> <product>vtscada:11.0.07</product> <product>vtscada:11.1.05</product> <product>vtscada:11.1.06</product> <product>vtscada:11.1.09</product> <product>vtscada:11.1.10</product> <product>vtscada:11.1.13</product> <product>vtscada:11.1.14</product> <product>vtscada:11.1.15</product> <product>vtscada:11.1.16</product> <product>vtscada:11.1.17</product> <product>vtscada:11.1.18</product> <product>vtscada:11.1.19</product> <product>vtscada:11.1.20</product> <product>vtscada:11.1.21</product> <product>vtscada:11.1.22</product> <product>vtscada:11.1.24</product> </cve> <cve id="CVE-2016-4047" level="LOW"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-4513" level="MEDIUM"> <product>powerlogic_pm8ecc_firmware:2.60</product> </cve> <cve id="CVE-2016-4042" level="LOW"> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> </cve> <cve id="CVE-2016-1563" level="MEDIUM"> <product>clustered_data_ontap:8.3.1</product> </cve> <cve id="CVE-2016-4040" level="LOW"> <product>dotcms:3.3.1</product> </cve> <cve id="CVE-2016-1561" level="LOW"> <product>ex10000e_firmware:4.8</product> <product>ex13000e_firmware:4.8</product> <product>ex21000e_firmware:4.8</product> <product>ex3000_firmware:4.8</product> <product>ex32000e_firmware:4.8</product> <product>ex40000e_firmware:4.8</product> <product>ex5000_firmware:4.8</product> <product>ex7000_firmware:4.8</product> </cve> <cve id="CVE-2016-9333" level="LOW"> <product>softcms:1.5</product> </cve> <cve id="CVE-2016-9332" level="LOW"> <product>softcms:1.5</product> </cve> <cve id="CVE-2016-9337" level="HIGH"> <product>gateway_ecu:-</product> </cve> <cve id="CVE-2016-3235" level="MEDIUM"> <product>visio:2007</product> <product>visio:2010</product> <product>visio:2013</product> <product>visio:2016</product> <product>visio_viewer:2007</product> <product>visio_viewer:2010</product> </cve> <cve id="CVE-2016-9334" level="LOW"> <product>1763-l16awa_series_a:14.000</product> <product>1763-l16awa_series_b:14.000</product> <product>1763-l16bbb_series_a:14.000</product> <product>1763-l16bbb_series_b:14.000</product> <product>1763-l16bwa_series_a:14.000</product> <product>1763-l16bwa_series_b:14.000</product> <product>1763-l16dwd_series_a:14.000</product> <product>1763-l16dwd_series_b:14.000</product> <product>1766-l32awa_series_a:15.004</product> <product>1766-l32awa_series_b:15.004</product> <product>1766-l32awaa_series_a:15.004</product> <product>1766-l32awaa_series_b:15.004</product> <product>1766-l32bwa_series_a:15.004</product> <product>1766-l32bwa_series_b:15.004</product> <product>1766-l32bwaa_series_a:15.004</product> <product>1766-l32bwaa_series_b:15.004</product> <product>1766-l32bxb_series_a:15.004</product> <product>1766-l32bxb_series_b:15.004</product> <product>1766-l32bxba_series_a:15.004</product> <product>1766-l32bxba_series_b:15.004</product> </cve> <cve id="CVE-2016-9339" level="LOW"> <product>vdr_g4e_firmware:5.220</product> </cve> <cve id="CVE-2016-9338" level="LOW"> <product>1763-l16awa_series_a:14.000</product> <product>1763-l16awa_series_b:14.000</product> <product>1763-l16bbb_series_a:14.000</product> <product>1763-l16bbb_series_b:14.000</product> <product>1763-l16bwa_series_a:14.000</product> <product>1763-l16bwa_series_b:14.000</product> <product>1763-l16dwd_series_a:14.000</product> <product>1763-l16dwd_series_b:14.000</product> <product>1766-l32awa_series_a:15.004</product> <product>1766-l32awa_series_b:15.004</product> <product>1766-l32awaa_series_a:15.004</product> <product>1766-l32awaa_series_b:15.004</product> <product>1766-l32bwa_series_a:15.004</product> <product>1766-l32bwa_series_b:15.004</product> <product>1766-l32bwaa_series_a:15.004</product> <product>1766-l32bwaa_series_b:15.004</product> <product>1766-l32bxb_series_a:15.004</product> <product>1766-l32bxb_series_b:15.004</product> <product>1766-l32bxba_series_a:15.004</product> <product>1766-l32bxba_series_b:15.004</product> </cve> <cve id="CVE-2016-5849" level="MEDIUM"> <product>sicam_pas:8.06</product> </cve> <cve id="CVE-2016-5848" level="LOW"> <product>sicam_pas:8.06</product> </cve> <cve id="CVE-2016-5845" level="LOW"> <product>sapcar_archive_tool:-</product> </cve> <cve id="CVE-2016-5336" level="LOW"> <product>vrealize_automation:7.0</product> <product>vrealize_automation:7.0.1</product> </cve> <cve id="CVE-2016-5847" level="MEDIUM"> <product>sapcar_archive_tool:-</product> </cve> <cve id="CVE-2016-5334" level="LOW"> <product>identity_manger:2.0</product> <product>identity_manger:2.1.0</product> <product>identity_manger:2.1.1</product> <product>identity_manger:2.4</product> <product>identity_manger:2.6</product> <product>identity_manger:2.7</product> <product>vrealize_automation:7.0</product> <product>vrealize_automation:7.0.1</product> <product>vrealize_automation:7.1</product> </cve> <cve id="CVE-2016-5333" level="MEDIUM"> <product>photon_os:1.0</product> </cve> <cve id="CVE-2016-5840" level="LOW"> <product>deep_discovery_inspector:3.7</product> <product>deep_discovery_inspector:3.81</product> <product>deep_discovery_inspector:3.82</product> </cve> <cve id="CVE-2016-5843" level="LOW"> <product>faq:2.0.1</product> <product>faq:2.0.2</product> <product>faq:2.0.3</product> <product>faq:2.0.4</product> <product>faq:2.0.5</product> <product>faq:2.0.6</product> <product>faq:2.0.7</product> <product>faq:2.0.8</product> <product>faq:2.1.0</product> <product>faq:2.1.1</product> <product>faq:2.1.2</product> <product>faq:2.1.3</product> <product>faq:2.1.4</product> <product>faq:2.2.0</product> <product>faq:2.2.1</product> <product>faq:2.2.2</product> <product>faq:2.2.3</product> <product>faq:2.3.0</product> <product>faq:2.3.1</product> <product>faq:2.3.2</product> <product>faq:2.3.3</product> <product>faq:2.3.4</product> <product>faq:4.0.0</product> <product>faq:4.0.1</product> <product>faq:4.0.2</product> <product>faq:4.0.3</product> <product>faq:5.0.0</product> <product>faq:5.0.1</product> <product>faq:5.0.2</product> <product>faq:5.0.3</product> </cve> <cve id="CVE-2016-5330" level="MEDIUM"> <product>fusion:8.1</product> <product>fusion:8.1</product> <product>fusion:8.1.1</product> <product>tools:10.0.5</product> <product>workstation_player:12.1</product> <product>workstation_player:12.1.1</product> <product>workstation_pro:12.1</product> <product>workstation_pro:12.1.1</product> <product>esxi:5.0</product> <product>esxi:5.1</product> <product>esxi:5.5</product> <product>esxi:6.0</product> </cve> <cve id="CVE-2016-10319" level="MEDIUM"> <product>arm_trusted_firmware:1.2</product> <product>arm_trusted_firmware:1.3</product> </cve> <cve id="CVE-2016-10316" level="MEDIUM"> <product>al3g_firmware:2.23m</product> <product>al5000ac_firmware:1.13</product> <product>al59300_firmware:1.04</product> </cve> <cve id="CVE-2016-4198" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-10314" level="LOW"> <product>al3g_firmware:2.23m</product> <product>al5000ac_firmware:1.13</product> <product>al59300_firmware:1.04</product> </cve> <cve id="CVE-2016-10315" level="MEDIUM"> <product>al3g_firmware:2.23m</product> <product>al5000ac_firmware:1.13</product> <product>al59300_firmware:1.04</product> </cve> <cve id="CVE-2016-10312" level="LOW"> <product>al3g_firmware:2.23m</product> <product>al5000ac_firmware:1.13</product> <product>al59300_firmware:1.04</product> </cve> <cve id="CVE-2016-10313" level="MEDIUM"> <product>al3g_firmware:2.23m</product> <product>al5000ac_firmware:1.13</product> <product>al59300_firmware:1.04</product> </cve> <cve id="CVE-2016-10310" level="LOW"> <product>sql_anywhere:17.0</product> </cve> <cve id="CVE-2016-4199" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-0860" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0861" level="LOW"> <product>ups_snmp_web_adapter_firmware:4.7</product> </cve> <cve id="CVE-2016-0862" level="LOW"> <product>snmp_web_adapter_firmware:4.7</product> </cve> <cve id="CVE-2016-0863" level="MEDIUM"> <product>smartgrid_lighthouse_sensor_management_system:4.1.0</product> <product>smartgrid_lighthouse_sensor_management_system:5.0</product> </cve> <cve id="CVE-2016-0864" level="LOW"> <product>smartgrid_lighthouse_sensor_management_system:4.1.0</product> <product>smartgrid_lighthouse_sensor_management_system:5.0</product> </cve> <cve id="CVE-2016-0865" level="LOW"> <product>smartgrid_lighthouse_sensor_management_system:4.1.0</product> <product>smartgrid_lighthouse_sensor_management_system:5.0</product> </cve> <cve id="CVE-2016-0866" level="MEDIUM"> <product>smartgrid_lighthouse_sensor_management_system:4.1.0</product> <product>smartgrid_lighthouse_sensor_management_system:5.0</product> </cve> <cve id="CVE-2016-0867" level="LOW"> <product>plantvisor_enhanced</product> </cve> <cve id="CVE-2016-0868" level="LOW"> <product>1763-l16awa_series_a:15.000</product> <product>1763-l16awa_series_b:15.000</product> <product>1763-l16bbb_series_a:15.000</product> <product>1763-l16bbb_series_b:15.000</product> <product>1763-l16bwa_series_a:15.000</product> <product>1763-l16bwa_series_b:15.000</product> <product>1763-l16dwd_series_a:15.000</product> <product>1763-l16dwd_series_b:15.000</product> </cve> <cve id="CVE-2016-0869" level="MEDIUM"> <product>promotic:8.3.10</product> </cve> <cve id="CVE-2016-3072" level="LOW"> <product>katello:-</product> <product>satellite:6.1</product> </cve> <cve id="CVE-2016-2310" level="LOW"> <product>multilink_firmware:5.4.1</product> <product>multilink_firmware:5.5.0</product> </cve> <cve id="CVE-2016-2311" level="LOW"> <product>alertwerks_servsensor_contact_firmware:-</product> <product>alertwerks_servsensor_firmware:-</product> <product>alertwerks_servsensor_junior_firmware:-</product> <product>alertwerks_servsensor_junior_firmware:-</product> </cve> <cve id="CVE-2016-2312" level="LOW"> <product>kscreenlocker:5.5.4</product> <product>plasma-workspace:5.4.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-2313" level="LOW"> <product>cacti:0.8.8f</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2314" level="MEDIUM"> <product>mt882_firmware:v200r002b022_arg</product> </cve> <cve id="CVE-2016-2316" level="MEDIUM"> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.1</product> <product>asterisk:1.8.1</product> <product>asterisk:1.8.1.1</product> <product>asterisk:1.8.1.2</product> <product>asterisk:1.8.2</product> <product>asterisk:1.8.2.1</product> <product>asterisk:1.8.2.2</product> <product>asterisk:1.8.2.3</product> <product>asterisk:1.8.2.4</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3.1</product> <product>asterisk:1.8.3.2</product> <product>asterisk:1.8.3.3</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4.1</product> <product>asterisk:1.8.4.2</product> <product>asterisk:1.8.4.3</product> <product>asterisk:1.8.4.4</product> <product>asterisk:1.8.5</product> <product>asterisk:1.8.5</product> <product>asterisk:1.8.5.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.1</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.1</product> <product>asterisk:1.8.8.2</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.1</product> <product>asterisk:1.8.9.2</product> <product>asterisk:1.8.9.3</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.1</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.12</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.1</product> <product>asterisk:1.8.12.2</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.1</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.1</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.1</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.1</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.1</product> <product>asterisk:1.8.20.1</product> <product>asterisk:1.8.20.2</product> <product>asterisk:1.8.20.2</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.1</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.1</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.26.0</product> <product>asterisk:1.8.26.0</product> <product>asterisk:1.8.26.1</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.28.0</product> <product>asterisk:1.8.28.0</product> <product>asterisk:1.8.28.1</product> <product>asterisk:1.8.28.2</product> <product>asterisk:1.8.32.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.1</product> <product>asterisk:11.0.2</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.1</product> <product>asterisk:11.1.2</product> <product>asterisk:11.2.0</product> <product>asterisk:11.4.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.1</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.10.0</product> <product>asterisk:11.10.0</product> <product>asterisk:11.10.1</product> <product>asterisk:11.10.1</product> <product>asterisk:11.11.0</product> <product>asterisk:11.11.0</product> <product>asterisk:11.12.0</product> <product>asterisk:11.12.0</product> <product>asterisk:11.13.0</product> <product>asterisk:11.13.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.16.0</product> <product>asterisk:11.16.0</product> <product>asterisk:11.17.0</product> <product>asterisk:11.18.0</product> <product>asterisk:11.18.0</product> <product>asterisk:11.19.0</product> <product>asterisk:11.20.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:12.0.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.1</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.1</product> <product>asterisk:12.3.2</product> <product>asterisk:12.4.0</product> <product>asterisk:12.4.0</product> <product>asterisk:12.5.0</product> <product>asterisk:12.5.0</product> <product>asterisk:12.6.0</product> <product>asterisk:12.6.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.1</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.1</product> <product>asterisk:12.8.2</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.1</product> <product>asterisk:13.1.0</product> <product>asterisk:13.1.0</product> <product>asterisk:13.1.0</product> <product>asterisk:13.2.0</product> <product>asterisk:13.2.0</product> <product>asterisk:13.3.0</product> <product>asterisk:13.4.0</product> <product>asterisk:13.4.0</product> <product>asterisk:13.5.0</product> <product>asterisk:13.5.0</product> <product>asterisk:13.6.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>certified_asterisk:1.8.28</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1.0</product> <product>certified_asterisk:13.1.0</product> <product>certified_asterisk:13.1.0</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-8886" level="MEDIUM"> <product>jasper:1.900.10</product> </cve> <cve id="CVE-2016-8887" level="MEDIUM"> <product>jasper:1.900.9</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-8884" level="MEDIUM"> <product>jasper:1.900.5</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-8885" level="MEDIUM"> <product>jasper:1.900.8</product> </cve> <cve id="CVE-2016-8882" level="MEDIUM"> <product>jasper:1.900.7</product> </cve> <cve id="CVE-2016-8883" level="MEDIUM"> <product>jasper:1.900.7</product> </cve> <cve id="CVE-2016-7279" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-8889" level="LOW"> <product>bitcoin_knots:0.11.0</product> <product>bitcoin_knots:0.11.0</product> <product>bitcoin_knots:0.11.0</product> <product>bitcoin_knots:0.11.0</product> <product>bitcoin_knots:0.11.1</product> <product>bitcoin_knots:0.11.1</product> <product>bitcoin_knots:0.11.1</product> <product>bitcoin_knots:0.11.2</product> <product>bitcoin_knots:0.11.2</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0</product> <product>bitcoin_knots:0.12.0.knots20160226</product> <product>bitcoin_knots:0.12.1.knots20160629</product> <product>bitcoin_knots:0.13.0.knots20160814</product> </cve> <cve id="CVE-2016-0731" level="LOW"> <product>ambari:2.2.0</product> </cve> <cve id="CVE-2016-7102" level="LOW"> <product>owncloud_desktop:2.2.2</product> </cve> <cve id="CVE-2016-7103" level="MEDIUM"> <product>jquery-ui:1.11.4</product> </cve> <cve id="CVE-2016-7101" level="MEDIUM"> <product>imagemagick:7.0.2-9</product> </cve> <cve id="CVE-2016-0797" level="LOW"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> </cve> <cve id="CVE-2016-6549" level="LOW"> <product>nut_mobile:-</product> </cve> <cve id="CVE-2016-6548" level="LOW"> <product>nut_mobile:-</product> </cve> <cve id="CVE-2016-6019" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.2.16</product> <product>emptoris_strategic_supply_management:10.0.2.17</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.0.11</product> <product>emptoris_strategic_supply_management:10.1.0.12</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> </cve> <cve id="CVE-2016-6018" level="LOW"> <product>emptoris_contract_management:10.0.0.0</product> <product>emptoris_contract_management:10.0.0.1</product> <product>emptoris_contract_management:10.0.1.0</product> <product>emptoris_contract_management:10.0.1.1</product> <product>emptoris_contract_management:10.0.1.2</product> <product>emptoris_contract_management:10.0.1.3</product> <product>emptoris_contract_management:10.0.1.4</product> <product>emptoris_contract_management:10.0.1.5</product> <product>emptoris_contract_management:10.0.2.0</product> <product>emptoris_contract_management:10.0.2.1</product> <product>emptoris_contract_management:10.0.2.2</product> <product>emptoris_contract_management:10.0.2.3</product> <product>emptoris_contract_management:10.0.2.5</product> <product>emptoris_contract_management:10.0.2.6</product> <product>emptoris_contract_management:10.0.2.7</product> <product>emptoris_contract_management:10.0.2.8</product> <product>emptoris_contract_management:10.0.2.9</product> <product>emptoris_contract_management:10.0.2.10</product> <product>emptoris_contract_management:10.0.2.11</product> <product>emptoris_contract_management:10.0.2.12</product> <product>emptoris_contract_management:10.0.2.13</product> <product>emptoris_contract_management:10.0.2.14</product> <product>emptoris_contract_management:10.0.2.15</product> <product>emptoris_contract_management:10.0.2.16</product> <product>emptoris_contract_management:10.0.2.17</product> <product>emptoris_contract_management:10.0.4.0</product> <product>emptoris_contract_management:10.1.0.0</product> </cve> <cve id="CVE-2016-3060" level="MEDIUM"> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.13</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.0.14</product> <product>financial_transaction_manager:3.0.1.0</product> <product>financial_transaction_manager:3.0.1.0</product> </cve> <cve id="CVE-2016-3063" level="MEDIUM"> <product>oncommand_system_manager:8.3.1</product> </cve> <cve id="CVE-2016-6542" level="MEDIUM"> <product>itrackeasy:-</product> </cve> <cve id="CVE-2016-6545" level="LOW"> <product>itrackeasy:-</product> </cve> <cve id="CVE-2016-3064" level="LOW"> <product>clustered_data_ontap:8.2.4</product> <product>clustered_data_ontap:8.3</product> <product>clustered_data_ontap:8.3.1</product> <product>clustered_data_ontap:8.3.2</product> </cve> <cve id="CVE-2016-3067" level="LOW"> <product>cygwin:2.4.1-1</product> </cve> <cve id="CVE-2016-3066" level="LOW"> <product>spice-gtk:0.1.0</product> <product>spice-gtk:0.2</product> <product>spice-gtk:0.3</product> <product>spice-gtk:0.4</product> <product>spice-gtk:0.5</product> <product>spice-gtk:0.6</product> <product>spice-gtk:0.7</product> <product>spice-gtk:0.8</product> <product>spice-gtk:0.9</product> <product>spice-gtk:0.10</product> <product>spice-gtk:0.11</product> <product>spice-gtk:0.12</product> <product>spice-gtk:0.12.101</product> <product>spice-gtk:0.13</product> <product>spice-gtk:0.13.17</product> <product>spice-gtk:0.13.29</product> <product>spice-gtk:0.14</product> <product>spice-gtk:0.15</product> <product>spice-gtk:0.15.3</product> <product>spice-gtk:0.16</product> <product>spice-gtk:0.17</product> <product>spice-gtk:0.18</product> <product>spice-gtk:0.19</product> <product>spice-gtk:0.20</product> <product>spice-gtk:0.21</product> <product>spice-gtk:0.22</product> <product>spice-gtk:0.23</product> <product>spice-gtk:0.24</product> <product>spice-gtk:0.25</product> <product>spice-gtk:0.26</product> <product>spice-gtk:0.27</product> <product>spice-gtk:0.28</product> <product>spice-gtk:0.29</product> <product>spice-gtk:0.30</product> <product>spice-gtk:0.31</product> <product>spice-gtk:0.32</product> <product>spice-gtk:0.33</product> </cve> <cve id="CVE-2016-7948" level="LOW"> <product>libxrandr:1.5.0</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7949" level="LOW"> <product>libxrender:0.9.9</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7942" level="LOW"> <product>libx11:1.6.3</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7943" level="LOW"> <product>libx11:1.6.3</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7940" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0261" level="MEDIUM"> <product>care_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0.0</product> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> </cve> <cve id="CVE-2016-7946" level="LOW"> <product>libxi:1.7.6</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7947" level="LOW"> <product>libxrandr:1.5.0</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7944" level="LOW"> <product>libxfixes:5.0.2</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7945" level="LOW"> <product>libxi:1.7.6</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-4947" level="LOW"> <product>hue:3.9.0</product> </cve> <cve id="CVE-2016-4946" level="MEDIUM"> <product>hue:3.9.0</product> </cve> <cve id="CVE-2016-4945" level="MEDIUM"> <product>netscaler_gateway_11.0_firmware:65.35</product> </cve> <cve id="CVE-2016-4949" level="LOW"> <product>manager:5.5.0</product> </cve> <cve id="CVE-2016-4948" level="MEDIUM"> <product>manager:5.5.0</product> </cve> <cve id="CVE-2016-0084" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-0080" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-10073" level="LOW"> <product>vanilla_forums:2.3</product> </cve> <cve id="CVE-2016-10072" level="MEDIUM"> <product>wampserver:3.0.6</product> </cve> <cve id="CVE-2016-10071" level="MEDIUM"> <product>imagemagick:6.9.3-10</product> </cve> <cve id="CVE-2016-10070" level="MEDIUM"> <product>imagemagick:6.9.3-10</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-3688" level="LOW"> <product>dotcms:3.3.1</product> </cve> <cve id="CVE-2016-10075" level="LOW"> <product>tqdm:4.4.1</product> <product>tqdm:4.10</product> </cve> <cve id="CVE-2016-10074" level="LOW"> <product>swiftmailer:5.4.4</product> </cve> <cve id="CVE-2016-3685" level="MEDIUM"> <product>download_manager:2.1.142</product> </cve> <cve id="CVE-2016-3684" level="MEDIUM"> <product>download_manager:2.1.142</product> </cve> <cve id="CVE-2016-3687" level="HIGH"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_edge_gateway:11.2.1</product> </cve> <cve id="CVE-2016-3686" level="MEDIUM"> <product>big-ip_access_policy_manager:11.0.0</product> <product>big-ip_access_policy_manager:11.1.0</product> <product>big-ip_access_policy_manager:11.2.0</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.3.0</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_edge_gateway:11.0.0</product> <product>big-ip_edge_gateway:11.1.0</product> <product>big-ip_edge_gateway:11.2.0</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_edge_gateway:11.3.0</product> </cve> <cve id="CVE-2016-3681" level="MEDIUM"> <product>mate_8_firmware:-</product> </cve> <cve id="CVE-2016-3680" level="MEDIUM"> <product>mate_8_firmware:-</product> </cve> <cve id="CVE-2016-1135" level="MEDIUM"> <product>bhr-4grv2_firmware:1.04</product> <product>wex-300_firmware:1.90</product> <product>whr-1166dhp_firmware:1.90</product> <product>whr-300hp2_firmware:1.90</product> <product>whr-600d_firmware:1.90</product> <product>wmr-300_firmware:1.90</product> <product>wmr-433_firmware:1.01</product> <product>wsr-1166dhp_firmware:1.01</product> </cve> <cve id="CVE-2016-4414" level="LOW"> <product>quassel:0.12.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-1137" level="MEDIUM"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-1136" level="MEDIUM"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-1131" level="MEDIUM"> <product>dx_library:3.15e</product> </cve> <cve id="CVE-2016-1130" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1133" level="MEDIUM"> <product>h2o:1.6.1</product> <product>h2o:1.7.0</product> </cve> <cve id="CVE-2016-4412" level="HIGH"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> </cve> <cve id="CVE-2016-1139" level="MEDIUM"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-1138" level="MEDIUM"> <product>home_spot_cube_firmware:2.0</product> </cve> <cve id="CVE-2016-8508" level="MEDIUM"> <product>yandex_browser:17.0</product> </cve> <cve id="CVE-2016-8503" level="LOW"> <product>yandex_browser:16.7.0.3342</product> <product>yandex_browser:16.7.1.20808</product> <product>yandex_browser:16.9.1.1131</product> </cve> <cve id="CVE-2016-8502" level="LOW"> <product>yandex_browser:15.12.0.6151</product> <product>yandex_browser:15.12.1.6475</product> <product>yandex_browser:16.2.0.3539</product> </cve> <cve id="CVE-2016-8501" level="LOW"> <product>yandex_browser:15.10.2454.3845</product> <product>yandex_browser:15.12.0.6151</product> <product>yandex_browser:15.12.1.6475</product> </cve> <cve id="CVE-2016-8507" level="MEDIUM"> <product>yandex_browser:16.9.0</product> </cve> <cve id="CVE-2016-8506" level="MEDIUM"> <product>yandex_browser:15.2.2214.3645</product> <product>yandex_browser:15.4.2272.3429</product> <product>yandex_browser:15.6.2311.5029</product> <product>yandex_browser:15.12.0.6151</product> <product>yandex_browser:15.12.1.6475</product> <product>yandex_browser:16.2.0.3539</product> </cve> <cve id="CVE-2016-8505" level="MEDIUM"> <product>yandex.browser:16.4.0.94.4</product> </cve> <cve id="CVE-2016-8504" level="MEDIUM"> <product>yandex_browser:16.6.1.30165</product> </cve> <cve id="CVE-2016-9104" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9105" level="LOW"> <product>qemu:-</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9106" level="LOW"> <product>qemu:-</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9107" level="LOW"> <product>gajim-otr:-</product> </cve> <cve id="CVE-2016-9101" level="LOW"> <product>qemu:-</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9102" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9103" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9108" level="LOW"> <product>mujs:5008105780c0b0182ea6eda83ad5598f225be3ee</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-9109" level="LOW"> <product>mujs:-</product> </cve> <cve id="CVE-2016-1353" level="LOW"> <product>videoscape_distribution_suite_for_internet_streaming:3.3.0</product> <product>videoscape_distribution_suite_for_internet_streaming:3.3.1</product> <product>videoscape_distribution_suite_for_internet_streaming:4.0.0</product> <product>videoscape_distribution_suite_for_internet_streaming:4.1.0</product> </cve> <cve id="CVE-2016-1352" level="LOW"> <product>unified_computing_system_central_software:1.3%280.1%29</product> </cve> <cve id="CVE-2016-1355" level="MEDIUM"> <product>firesight_system_software:6.1.0</product> </cve> <cve id="CVE-2016-1354" level="MEDIUM"> <product>unified_communications_domain_manager:8.0</product> <product>unified_communications_domain_manager:8.0.1</product> <product>unified_communications_domain_manager:8.0.2</product> </cve> <cve id="CVE-2016-1357" level="LOW"> <product>cisco_policy_suite:7.0.1.3</product> <product>cisco_policy_suite:7.0.2</product> <product>cisco_policy_suite:7.0.2-att</product> <product>cisco_policy_suite:7.0.3-att</product> <product>cisco_policy_suite:7.0.4-att</product> <product>cisco_policy_suite:7.0.5</product> </cve> <cve id="CVE-2016-1356" level="MEDIUM"> <product>firesight_system_software:_6.1.0</product> </cve> <cve id="CVE-2016-1359" level="LOW"> <product>prime_infrastructure:3.0.0</product> </cve> <cve id="CVE-2016-1358" level="LOW"> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:3.0.0</product> <product>prime_infrastructure:3.1.0</product> </cve> <cve id="CVE-2016-1000031" level="LOW"> <product>commons_fileupload:1.3.2</product> </cve> <cve id="CVE-2016-1000032" level="LOW"> <product>tgcaptcha2:0.3.0</product> </cve> <cve id="CVE-2016-0456" level="LOW"> <product>e-business_suite:12.1</product> <product>e-business_suite:12.2</product> </cve> <cve id="CVE-2016-5453" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5450" level="MEDIUM"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> <product>siebel_ui_framework:2014</product> <product>siebel_ui_framework:2015</product> <product>siebel_ui_framework:2016</product> </cve> <cve id="CVE-2016-5451" level="LOW"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> <product>siebel_ui_framework:2014</product> <product>siebel_ui_framework:2015</product> <product>siebel_ui_framework:2016</product> </cve> <cve id="CVE-2016-5456" level="MEDIUM"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-5457" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5455" level="LOW"> <product>communications_messaging_server:6.3</product> <product>communications_messaging_server:7.0</product> <product>communications_messaging_server:8.0</product> </cve> <cve id="CVE-2016-5458" level="LOW"> <product>communications_eagle_application_processor:16.0</product> </cve> <cve id="CVE-2016-5459" level="MEDIUM"> <product>siebel_core-common_components:8.1.1</product> <product>siebel_core-common_components:8.2.2</product> <product>siebel_core-common_components:2014</product> <product>siebel_core-common_components:2015</product> <product>siebel_core-common_components:2016</product> </cve> <cve id="CVE-2016-0450" level="LOW"> <product>goldengate:11.2</product> <product>goldengate:12.1.2</product> </cve> <cve id="CVE-2016-6220" level="LOW"> <product>trend_micro_control_manager:6.0</product> </cve> <cve id="CVE-2016-6223" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-6225" level="MEDIUM"> <product>xtrabackup:2.3.5</product> <product>xtrabackup:2.4.0</product> <product>xtrabackup:2.4.1</product> <product>xtrabackup:2.4.2</product> <product>xtrabackup:2.4.3</product> <product>xtrabackup:2.4.4</product> <product>fedora:24</product> <product>fedora:25</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-2104" level="MEDIUM"> <product>satellite:5.7</product> </cve> <cve id="CVE-2016-2100" level="LOW"> <product>foreman:1.10.2</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> </cve> <cve id="CVE-2016-2103" level="MEDIUM"> <product>network_satellite:5.7</product> </cve> <cve id="CVE-2016-2102" level="LOW"> <product>haproxy:-</product> </cve> <cve id="CVE-2016-6956" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6957" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6954" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6955" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6952" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6953" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6950" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6951" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6958" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6959" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-9984" level="LOW"> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> </cve> <cve id="CVE-2016-9985" level="LOW"> <product>cognos_business_intelligence:10.1.1</product> <product>cognos_business_intelligence:10.2</product> </cve> <cve id="CVE-2016-9986" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> <product>jazz_reporting_service:6.0.3</product> </cve> <cve id="CVE-2016-7572" level="LOW"> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> </cve> <cve id="CVE-2016-7571" level="MEDIUM"> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> </cve> <cve id="CVE-2016-7570" level="LOW"> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> </cve> <cve id="CVE-2016-1900" level="MEDIUM"> <product>cgit:0.11.2</product> <product>fedora:22</product> </cve> <cve id="CVE-2016-1901" level="LOW"> <product>cgit:0.11.2</product> <product>fedora:22</product> </cve> <cve id="CVE-2016-9980" level="MEDIUM"> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:5.2</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0</product> <product>curam_social_program_management:6.0.0</product> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:7.0.0.0</product> </cve> <cve id="CVE-2016-1908" level="LOW"> <product>openssh:7.1</product> </cve> <cve id="CVE-2016-1909" level="LOW"> <product>fortios:4.3.16</product> <product>fortios:5.0</product> <product>fortios:5.0.0</product> <product>fortios:5.0.1</product> <product>fortios:5.0.2</product> <product>fortios:5.0.3</product> <product>fortios:5.0.4</product> <product>fortios:5.0.5</product> <product>fortios:5.0.6</product> <product>fortios:5.0.7</product> </cve> <cve id="CVE-2016-9981" level="MEDIUM"> <product>security_appscan:9.0.0.0</product> <product>security_appscan:9.0.0.1</product> <product>security_appscan:9.0.1.0</product> <product>security_appscan:9.0.1.1</product> <product>security_appscan:9.0.2.0</product> <product>security_appscan:9.0.2.1</product> <product>security_appscan:9.0.3.0</product> <product>security_appscan:9.0.3.1</product> <product>security_appscan:9.0.3.4</product> <product>security_appscan:9.0.3.5</product> </cve> <cve id="CVE-2016-4882" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4883" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4880" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4881" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4886" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4887" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4884" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4885" level="MEDIUM"> <product>basercms:3.0.10</product> </cve> <cve id="CVE-2016-4888" level="MEDIUM"> <product>servicedesk_plus:9.1</product> </cve> <cve id="CVE-2016-4889" level="LOW"> <product>servicedesk_plus:8.2</product> </cve> <cve id="CVE-2016-6980" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-3212" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3210" level="MEDIUM"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3211" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3214" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-9989" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> <product>jazz_reporting_service:6.0.3</product> </cve> <cve id="CVE-2016-1928" level="LOW"> <product>hana:-</product> </cve> <cve id="CVE-2016-9997" level="MEDIUM"> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.0</product> <product>spip:3.1.1</product> <product>spip:3.1.2</product> <product>spip:3.1.3</product> </cve> <cve id="CVE-2016-7000" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3014" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> </cve> <cve id="CVE-2016-3015" level="MEDIUM"> <product>cognos_analytics:11.0.0.0</product> <product>cognos_analytics:11.0.1.0</product> <product>cognos_analytics:11.0.2.0</product> <product>cognos_analytics:11.0.3.0</product> <product>cognos_analytics:11.0.4.0</product> </cve> <cve id="CVE-2016-3016" level="MEDIUM"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-9358" level="LOW"> <product>a320_firmware:-</product> <product>a325_firmware:-</product> <product>a371_firmware:-</product> <product>a520_master_firmware:-</product> <product>a520_slave_firmware:-</product> <product>a530_firmware:-</product> <product>a542_firmware:-</product> <product>a571_firmware:-</product> <product>check_bin_grader_firmware:-</product> <product>flowlineqc_t376_firmware:-</product> <product>ipm3_dual_cam_firmware:132</product> <product>ipm3_dual_cam_firmware:139</product> <product>p520_firmware:-</product> <product>p574_firmware:-</product> <product>sensorx13_qc_flow_line_firmware:-</product> <product>sensorx23_qc_master_firmware:-</product> <product>sensorx23_qc_slave_firmware:-</product> <product>speed_batcher_firmware:-</product> <product>t374_firmware:-</product> <product>t377_firmware:-</product> <product>v36_firmware:-</product> <product>v36b_firmware:-</product> <product>v36c_firmware:-</product> </cve> <cve id="CVE-2016-6537" level="LOW"> <product>eh6108h%2b_firmware:x9.03.24.00.07l</product> </cve> <cve id="CVE-2016-9351" level="MEDIUM"> <product>susiaccess:3.0</product> </cve> <cve id="CVE-2016-3010" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-9353" level="LOW"> <product>susiaccess:3.0</product> </cve> <cve id="CVE-2016-9355" level="LOW"> <product>alaris_8015_pc_unit:9.5</product> <product>alaris_8015_pc_unit:9.7</product> </cve> <cve id="CVE-2016-9354" level="MEDIUM"> <product>dacenter:1.4</product> </cve> <cve id="CVE-2016-9357" level="LOW"> <product>eamaxx_series_epdu_firmware:01-31-2014</product> <product>eamxxx_series_epdu_firmware:06-30-2015</product> <product>emaaxx_series_epdu_firmware:01-31-2014</product> <product>emaxxx_series_epdu_firmware:01-31-2014</product> <product>eswaxx_series_epdu_firmware:01-31-2014</product> </cve> <cve id="CVE-2016-9356" level="LOW"> <product>dacenter:1.4</product> </cve> <cve id="CVE-2016-4088" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4089" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-7009" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-4086" level="MEDIUM"> <product>hisuite:2.3.15</product> <product>hisuite:2.3.28</product> <product>hisuite:2.3.35</product> <product>hisuite:2.3.42</product> <product>hisuite:2.3.50</product> <product>hisuite:2.3.55</product> <product>hisuite:2.3.55.1</product> </cve> <cve id="CVE-2016-4087" level="HIGH"> <product>s12700_firmware:v200r005c00spc300</product> <product>s5700_firmware:v200r001c00</product> <product>s5700_firmware:v200r002c00spc100</product> <product>s5700_firmware:v200r003c00spc300</product> <product>s5700_firmware:v200r005c00</product> </cve> <cve id="CVE-2016-0279" level="MEDIUM"> <product>domino:8.5.0</product> <product>domino:8.5.1</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.2</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.3</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:9.0.0</product> <product>domino:9.0.1</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> </cve> <cve id="CVE-2016-5685" level="LOW"> <product>idrac7_firmware:2.30.30.30</product> <product>idrac8_firmware:2.30.30.30</product> </cve> <cve id="CVE-2016-5684" level="MEDIUM"> <product>freeimage:3.17.0</product> </cve> <cve id="CVE-2016-5683" level="LOW"> <product>readydesk:9.1</product> </cve> <cve id="CVE-2016-5682" level="MEDIUM"> <product>swagger-ui:2.2.0</product> </cve> <cve id="CVE-2016-5681" level="MEDIUM"> <product>dir-822_firmware:3.01</product> <product>dir-817l%28w%29_firmware:jul.2016</product> <product>dir-818l%28w%29_firmware:2.05</product> <product>dir-823_firmware:1.00</product> <product>dir-850l_firmare:2.07</product> <product>dir-868l_firmware:2.03</product> <product>dir-868l_firmware:3.00</product> <product>dir-880l_firmware:1.07</product> <product>dir-885l_firmware:1.11</product> <product>dir-890l_firmware:1.09</product> <product>dir-895l_firmware:1.11</product> </cve> <cve id="CVE-2016-8793" level="HIGH"> <product>mate_8_firmware:-</product> <product>mate_s_firmware:-</product> <product>p8_firmware:-</product> </cve> <cve id="CVE-2016-1463" level="LOW"> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-4102" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4101" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4100" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4107" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4106" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-0271" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1.0</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1.0</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> </cve> <cve id="CVE-2016-4105" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-0270" level="MEDIUM"> <product>client_application_access:1.0.0.1</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>notes:9.0.1.3</product> <product>notes:9.0.1.4</product> <product>notes:9.0.1.5</product> </cve> <cve id="CVE-2016-10330" level="LOW"> <product>photo_station:6.5.2-3225</product> </cve> <cve id="CVE-2016-10331" level="LOW"> <product>photo_station:6.5.2-3225</product> </cve> <cve id="CVE-2016-4104" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-0273" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-7952" level="LOW"> <product>libxtst:1.2.2</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7955" level="LOW"> <product>ossim:5.3</product> <product>unified_security_management:5.3</product> </cve> <cve id="CVE-2016-7954" level="LOW"> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.0</product> <product>bundler:1.0.1</product> <product>bundler:1.0.2</product> <product>bundler:1.0.3</product> <product>bundler:1.0.4</product> <product>bundler:1.0.5</product> <product>bundler:1.0.6</product> <product>bundler:1.0.7</product> <product>bundler:1.0.8</product> <product>bundler:1.0.9</product> <product>bundler:1.0.10</product> <product>bundler:1.0.11</product> <product>bundler:1.0.12</product> <product>bundler:1.0.13</product> <product>bundler:1.0.14</product> <product>bundler:1.0.15</product> <product>bundler:1.0.16</product> <product>bundler:1.0.17</product> <product>bundler:1.0.18</product> <product>bundler:1.0.19</product> <product>bundler:1.0.20</product> <product>bundler:1.0.20</product> <product>bundler:1.0.21</product> <product>bundler:1.0.21</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1</product> <product>bundler:1.1.0</product> <product>bundler:1.1.1</product> <product>bundler:1.1.2</product> <product>bundler:1.1.3</product> <product>bundler:1.1.4</product> <product>bundler:1.1.5</product> <product>bundler:1.2.0</product> <product>bundler:1.2.0</product> <product>bundler:1.2.0</product> <product>bundler:1.2.0</product> <product>bundler:1.2.0</product> <product>bundler:1.2.1</product> <product>bundler:1.2.2</product> <product>bundler:1.2.3</product> <product>bundler:1.2.4</product> <product>bundler:1.2.5</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.0</product> <product>bundler:1.3.1</product> <product>bundler:1.3.2</product> <product>bundler:1.3.3</product> <product>bundler:1.3.4</product> <product>bundler:1.3.5</product> <product>bundler:1.3.6</product> <product>bundler:1.4.0</product> <product>bundler:1.4.0</product> <product>bundler:1.5.0</product> <product>bundler:1.5.0</product> <product>bundler:1.5.0</product> <product>bundler:1.5.1</product> <product>bundler:1.5.2</product> <product>bundler:1.5.3</product> <product>bundler:1.6.0</product> <product>bundler:1.6.1</product> <product>bundler:1.6.2</product> <product>bundler:1.6.3</product> <product>bundler:1.6.4</product> <product>bundler:1.6.5</product> <product>bundler:1.6.6</product> <product>bundler:1.6.7</product> <product>bundler:1.7.0</product> <product>bundler:1.7.1</product> <product>bundler:1.7.2</product> <product>bundler:1.7.3</product> <product>bundler:1.7.4</product> <product>bundler:1.7.5</product> <product>bundler:1.7.6</product> <product>bundler:1.7.7</product> <product>bundler:1.7.8</product> <product>bundler:1.7.9</product> <product>bundler:1.7.10</product> <product>bundler:1.7.11</product> <product>bundler:1.7.12</product> <product>bundler:1.7.13</product> <product>bundler:1.7.14</product> <product>bundler:1.7.15</product> <product>bundler:1.8.0</product> <product>bundler:1.8.0</product> <product>bundler:1.8.0</product> <product>bundler:1.8.1</product> <product>bundler:1.8.2</product> <product>bundler:1.8.3</product> <product>bundler:1.8.4</product> <product>bundler:1.8.5</product> <product>bundler:1.8.6</product> <product>bundler:1.8.7</product> <product>bundler:1.8.8</product> <product>bundler:1.8.9</product> <product>bundler:1.9.0</product> <product>bundler:1.9.0</product> <product>bundler:1.9.0</product> <product>bundler:1.9.0</product> <product>bundler:1.9.1</product> <product>bundler:1.9.2</product> <product>bundler:1.9.3</product> <product>bundler:1.9.4</product> <product>bundler:1.9.5</product> <product>bundler:1.9.6</product> <product>bundler:1.9.7</product> <product>bundler:1.9.8</product> <product>bundler:1.9.9</product> <product>bundler:1.9.10</product> <product>bundler:1.10.0</product> <product>bundler:1.10.0</product> <product>bundler:1.10.0</product> <product>bundler:1.10.0</product> <product>bundler:1.10.0</product> <product>bundler:1.10.1</product> <product>bundler:1.10.2</product> <product>bundler:1.10.3</product> <product>bundler:1.10.4</product> <product>bundler:1.10.5</product> <product>bundler:1.10.6</product> <product>bundler:1.11.0</product> <product>bundler:1.11.0</product> <product>bundler:1.11.0</product> <product>bundler:1.11.1</product> <product>bundler:1.11.2</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.0</product> <product>bundler:1.12.1</product> <product>bundler:1.12.2</product> <product>bundler:1.12.3</product> <product>bundler:1.12.4</product> <product>bundler:1.12.5</product> <product>bundler:1.12.6</product> <product>bundler:1.13.0</product> <product>bundler:1.13.0</product> <product>bundler:1.13.0</product> <product>bundler:1.13.0</product> <product>bundler:1.13.1</product> <product>bundler:1.13.2</product> <product>bundler:1.13.3</product> <product>bundler:1.13.4</product> <product>bundler:1.13.5</product> <product>bundler:1.13.6</product> </cve> <cve id="CVE-2016-6445" level="LOW"> <product>meeting_server:1.8.15</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9.0</product> <product>meeting_server:1.9.2</product> <product>meeting_server:2.0.0</product> <product>meeting_server:2.0.1</product> <product>meeting_server:2.0.3</product> <product>meeting_server:2.0.4</product> <product>meeting_server:2.0.5</product> </cve> <cve id="CVE-2016-6344" level="LOW"> <product>jboss_bpm_suite:6.3</product> </cve> <cve id="CVE-2016-3012" level="LOW"> <product>api_connect:5.0.2.0</product> <product>network_path_manager:2.1.1.9</product> </cve> <cve id="CVE-2016-1437" level="LOW"> <product>prime_collaboration_deployment:10.5.0</product> <product>prime_collaboration_deployment:10.5.1</product> <product>prime_collaboration_deployment:11.0_base</product> <product>prime_collaboration_deployment:11.5.0</product> </cve> <cve id="CVE-2016-6567" level="LOW"> <product>resident_download_manager:-</product> </cve> <cve id="CVE-2016-6566" level="LOW"> <product>etrakit3:3.2.1.17</product> </cve> <cve id="CVE-2016-6565" level="MEDIUM"> <product>nextgen_gallery:1.5.0</product> <product>nextgen_gallery:1.5.1</product> <product>nextgen_gallery:1.5.2</product> <product>nextgen_gallery:1.5.3</product> <product>nextgen_gallery:1.5.4</product> <product>nextgen_gallery:1.5.5</product> <product>nextgen_gallery:1.6.0</product> <product>nextgen_gallery:1.6.1</product> <product>nextgen_gallery:1.6.2</product> <product>nextgen_gallery:1.7.0</product> <product>nextgen_gallery:1.7.1</product> <product>nextgen_gallery:1.7.2</product> <product>nextgen_gallery:1.7.3</product> <product>nextgen_gallery:1.7.4</product> <product>nextgen_gallery:1.8.0</product> <product>nextgen_gallery:1.8.1</product> <product>nextgen_gallery:1.8.2</product> <product>nextgen_gallery:1.8.3</product> <product>nextgen_gallery:1.8.4</product> <product>nextgen_gallery:1.9.0</product> <product>nextgen_gallery:1.9.1</product> <product>nextgen_gallery:1.9.2</product> <product>nextgen_gallery:1.9.3</product> <product>nextgen_gallery:1.9.5</product> <product>nextgen_gallery:1.9.6</product> <product>nextgen_gallery:1.9.7</product> <product>nextgen_gallery:1.9.8</product> <product>nextgen_gallery:1.9.10</product> <product>nextgen_gallery:1.9.11</product> <product>nextgen_gallery:1.9.12</product> <product>nextgen_gallery:1.9.13</product> <product>nextgen_gallery:2.0</product> <product>nextgen_gallery:2.0.7</product> <product>nextgen_gallery:2.0.11</product> <product>nextgen_gallery:2.0.14</product> <product>nextgen_gallery:2.0.17</product> <product>nextgen_gallery:2.0.21</product> <product>nextgen_gallery:2.0.23</product> <product>nextgen_gallery:2.0.25</product> <product>nextgen_gallery:2.0.27</product> <product>nextgen_gallery:2.0.30</product> <product>nextgen_gallery:2.0.31</product> <product>nextgen_gallery:2.0.33</product> <product>nextgen_gallery:2.0.40</product> <product>nextgen_gallery:2.0.57</product> <product>nextgen_gallery:2.0.58</product> <product>nextgen_gallery:2.0.59</product> <product>nextgen_gallery:2.0.61</product> <product>nextgen_gallery:2.0.63</product> <product>nextgen_gallery:2.0.65</product> <product>nextgen_gallery:2.0.66</product> <product>nextgen_gallery:2.0.66.16</product> <product>nextgen_gallery:2.0.66.17</product> <product>nextgen_gallery:2.0.66.26</product> <product>nextgen_gallery:2.0.66.27</product> <product>nextgen_gallery:2.0.66.29</product> <product>nextgen_gallery:2.0.66.31</product> <product>nextgen_gallery:2.0.66.33</product> <product>nextgen_gallery:2.0.71</product> <product>nextgen_gallery:2.0.74</product> <product>nextgen_gallery:2.0.76</product> <product>nextgen_gallery:2.0.77</product> <product>nextgen_gallery:2.0.78</product> <product>nextgen_gallery:2.0.78.1</product> <product>nextgen_gallery:2.0.79</product> <product>nextgen_gallery:2.1.0</product> <product>nextgen_gallery:2.1.2</product> <product>nextgen_gallery:2.1.7</product> <product>nextgen_gallery:2.1.9</product> <product>nextgen_gallery:2.1.10</product> <product>nextgen_gallery:2.1.13</product> <product>nextgen_gallery:2.1.15</product> <product>nextgen_gallery:2.1.18</product> <product>nextgen_gallery:2.1.19</product> <product>nextgen_gallery:2.1.23</product> <product>nextgen_gallery:2.1.26</product> <product>nextgen_gallery:2.1.27</product> <product>nextgen_gallery:2.1.31</product> <product>nextgen_gallery:2.1.33</product> <product>nextgen_gallery:2.1.43</product> <product>nextgen_gallery:2.1.44</product> <product>nextgen_gallery:2.1.45</product> <product>nextgen_gallery:2.1.46</product> <product>nextgen_gallery:2.1.49</product> <product>nextgen_gallery:2.1.50</product> <product>nextgen_gallery:2.1.54</product> <product>nextgen_gallery:2.1.56</product> </cve> <cve id="CVE-2016-6564" level="MEDIUM"> <product>pro_2_firmware:-</product> <product>studio_6.0_hd_firmware:-</product> <product>studio_c_hd_firmware:-</product> <product>studio_g_firmware:-</product> <product>studio_g_plus_firmware:-</product> <product>studio_x_firmware:-</product> <product>studio_x_plus_firmware:-</product> <product>voyager_2_dg310i_firmware:-</product> <product>colorful_k45i_firmware:-</product> <product>hot_2_x510_firmware:-</product> <product>hot_x507_firmware:-</product> <product>zero_2_x509_firmware:-</product> <product>zero_x506_firmware:-</product> <product>alfa_6_firmware:-</product> <product>lead_2s_firmware:-</product> <product>lead_3i_firmware:-</product> <product>lead_5_firmware:-</product> <product>lead_6_firmware:-</product> <product>cube_5.0_firmware:-</product> </cve> <cve id="CVE-2016-6563" level="LOW"> <product>dir-818l%28w%29_firmware:-</product> <product>dir-822_firmware:-</product> <product>dir-823_firmware:-</product> <product>dir-850l_firmware:-</product> <product>dir-868l_firmware:-</product> <product>dir-880l_firmware:-</product> <product>dir-885l_firmware:-</product> <product>dir-890l_firmware:-</product> <product>dir-895l_firmware:-</product> </cve> <cve id="CVE-2016-6562" level="MEDIUM"> <product>shortel_mobility_client:9.1.3.109</product> <product>shortel_mobility_client:9.1.3.109</product> </cve> <cve id="CVE-2016-6561" level="LOW"> <product>illumos:-</product> </cve> <cve id="CVE-2016-6560" level="LOW"> <product>illumos:-</product> </cve> <cve id="CVE-2016-3049" level="MEDIUM"> <product>openpages_grc_platform:7.1</product> <product>openpages_grc_platform:7.2</product> <product>openpages_grc_platform:7.3</product> </cve> <cve id="CVE-2016-3048" level="MEDIUM"> <product>openpages_grc_platform:7.1.0.0</product> <product>openpages_grc_platform:7.1.0.1</product> <product>openpages_grc_platform:7.1.0.2</product> <product>openpages_grc_platform:7.1.0.3</product> <product>openpages_grc_platform:7.2.0.0</product> <product>openpages_grc_platform:7.2.0.1</product> <product>openpages_grc_platform:7.2.0.2</product> <product>openpages_grc_platform:7.2.0.3</product> <product>openpages_grc_platform:7.2.0.4</product> <product>openpages_grc_platform:7.3.0.0</product> </cve> <cve id="CVE-2016-7960" level="MEDIUM"> <product>simatic_step_7:13.010</product> </cve> <cve id="CVE-2016-0537" level="LOW"> <product>human_resources:11.5.10.2</product> </cve> <cve id="CVE-2016-0534" level="MEDIUM"> <product>project_contracts:12.1.1</product> <product>project_contracts:12.1.2</product> <product>project_contracts:12.1.3</product> </cve> <cve id="CVE-2016-0243" level="MEDIUM"> <product>websphere_portal:6.1.0.0</product> <product>websphere_portal:6.1.0.1</product> <product>websphere_portal:6.1.0.2</product> <product>websphere_portal:6.1.0.3</product> <product>websphere_portal:6.1.0.4</product> <product>websphere_portal:6.1.0.5</product> <product>websphere_portal:6.1.0.6</product> <product>websphere_portal:6.1.5.0</product> <product>websphere_portal:6.1.5.1</product> <product>websphere_portal:6.1.5.2</product> <product>websphere_portal:6.1.5.3</product> <product>websphere_portal:7.0.0.0</product> <product>websphere_portal:7.0.0.1</product> <product>websphere_portal:7.0.0.2</product> <product>websphere_portal:8.0.0.0</product> <product>websphere_portal:8.0.0.1</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-0244" level="MEDIUM"> <product>websphere_portal:6.1.0.0</product> <product>websphere_portal:6.1.0.1</product> <product>websphere_portal:6.1.0.2</product> <product>websphere_portal:6.1.0.3</product> <product>websphere_portal:6.1.0.4</product> <product>websphere_portal:6.1.0.5</product> <product>websphere_portal:6.1.0.6</product> <product>websphere_portal:6.1.5.0</product> <product>websphere_portal:6.1.5.1</product> <product>websphere_portal:6.1.5.2</product> <product>websphere_portal:6.1.5.3</product> <product>websphere_portal:7.0.0.0</product> <product>websphere_portal:7.0.0.1</product> <product>websphere_portal:7.0.0.2</product> <product>websphere_portal:8.0.0.0</product> <product>websphere_portal:8.0.0.1</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-0245" level="LOW"> <product>websphere_portal:8.0.0.0</product> <product>websphere_portal:8.0.0.1</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-0246" level="MEDIUM"> <product>security_guardium:8.2</product> <product>security_guardium:9.0</product> <product>security_guardium:9.1</product> <product>security_guardium:9.5</product> <product>security_guardium:10.0</product> <product>security_guardium:10.1</product> </cve> <cve id="CVE-2016-0247" level="LOW"> <product>security_guardium:8.2</product> <product>security_guardium:9.0</product> <product>security_guardium:9.1</product> <product>security_guardium:9.5</product> <product>security_guardium:10.0</product> <product>security_guardium:10.1</product> </cve> <cve id="CVE-2016-0248" level="MEDIUM"> <product>security_guardium:9.0</product> <product>security_guardium:10.0</product> </cve> <cve id="CVE-2016-7969" level="LOW"> <product>libass:0.13.3</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-0538" level="LOW"> <product>financial_consolidation_hub:11.5.10.2</product> <product>financial_consolidation_hub:12.1.1</product> <product>financial_consolidation_hub:12.1.2</product> <product>financial_consolidation_hub:12.1.3</product> </cve> <cve id="CVE-2016-0539" level="LOW"> <product>report_manager:11.5.10.2</product> <product>report_manager:12.1.3</product> <product>report_manager:12.2.3</product> <product>report_manager:12.2.4</product> </cve> <cve id="CVE-2016-8744" level="LOW"> <product>brooklyn:0.9.0</product> </cve> <cve id="CVE-2016-8746" level="MEDIUM"> <product>ranger:0.6.2</product> </cve> <cve id="CVE-2016-8741" level="LOW"> <product>qpid_java:6.0.1</product> <product>qpid_java:6.0.2</product> <product>qpid_java:6.0.3</product> <product>qpid_java:6.0.4</product> <product>qpid_java:6.0.5</product> <product>qpid_java:6.1.0</product> </cve> <cve id="CVE-2016-8742" level="LOW"> <product>couchdb:2.0.0</product> </cve> <cve id="CVE-2016-8749" level="LOW"> <product>camel:2.16.0</product> <product>camel:2.16.1</product> <product>camel:2.16.2</product> <product>camel:2.16.3</product> <product>camel:2.16.4</product> <product>camel:2.17.0</product> <product>camel:2.17.1</product> <product>camel:2.17.2</product> <product>camel:2.17.3</product> <product>camel:2.17.4</product> <product>camel:2.18.0</product> <product>camel:2.18.1</product> </cve> <cve id="CVE-2016-8748" level="MEDIUM"> <product>nifi:1.0.0</product> <product>nifi:1.1.0</product> </cve> <cve id="CVE-2016-4433" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> </cve> <cve id="CVE-2016-4432" level="LOW"> <product>qpid_java:6.0.2</product> </cve> <cve id="CVE-2016-4431" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> </cve> <cve id="CVE-2016-4430" level="MEDIUM"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> <product>struts:2.3.28.1</product> </cve> <cve id="CVE-2016-4437" level="MEDIUM"> <product>shiro:1.2.4</product> </cve> <cve id="CVE-2016-4436" level="LOW"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.14</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.12</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> <product>struts:2.3.28.1</product> <product>struts:2.5</product> <product>struts:2.5</product> <product>struts:2.5</product> <product>struts:2.5</product> </cve> <cve id="CVE-2016-4435" level="MEDIUM"> <product>bosh_stemcell:3146.13</product> <product>bosh_stemcell:3232.4</product> </cve> <cve id="CVE-2016-4434" level="MEDIUM"> <product>tika:1.12</product> </cve> <cve id="CVE-2016-1119" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4438" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.24.3</product> <product>struts:2.3.28</product> </cve> <cve id="CVE-2016-8293" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-8292" level="MEDIUM"> <product>your_sha256_hashn_manager:9.2</product> </cve> <cve id="CVE-2016-8291" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-8562" level="MEDIUM"> <product>simatic_cp_1543-1_firmware:-</product> </cve> <cve id="CVE-2016-8565" level="LOW"> <product>automation_license_manager:5.3</product> </cve> <cve id="CVE-2016-8296" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-8567" level="LOW"> <product>sicam_pas:-</product> </cve> <cve id="CVE-2016-8294" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-8299" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-8298" level="LOW"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-9160" level="MEDIUM"> <product>simatic_pcs_7:8.0</product> <product>simatic_wincc:7.1</product> </cve> <cve id="CVE-2016-9167" level="LOW"> <product>edirectory:9.0.1</product> </cve> <cve id="CVE-2016-9164" level="LOW"> <product>unified_infrastructure_management:8.4</product> </cve> <cve id="CVE-2016-9165" level="LOW"> <product>unified_infrastructure_management:8.47</product> <product>unified_infrastructure_management_snap:8.47</product> </cve> <cve id="CVE-2016-1377" level="MEDIUM"> <product>unity_connection:10.0.0</product> <product>unity_connection:10.0.5</product> <product>unity_connection:10.5%282%29</product> <product>unity_connection:10.5%282.3009%29</product> <product>unity_connection:11.0%280.98000.225%29</product> <product>unity_connection:11.0.0</product> </cve> <cve id="CVE-2016-9168" level="MEDIUM"> <product>edirectory:9.0.1</product> </cve> <cve id="CVE-2016-9169" level="MEDIUM"> <product>groupwise:2014</product> </cve> <cve id="CVE-2016-1373" level="LOW"> <product>finesse:8.5%281%29_base</product> <product>finesse:8.5%282%29_base</product> <product>finesse:8.5%283%29_base</product> <product>finesse:8.5%284%29_base</product> <product>finesse:8.5%285%29_base</product> <product>finesse:8.6%281%29_base</product> <product>finesse:9.0%281%29_base</product> <product>finesse:9.0%282%29_base</product> <product>finesse:9.1%281%29_base</product> <product>finesse:9.1%281%29_es1</product> <product>finesse:9.1%281%29_es2</product> <product>finesse:9.1%281%29_es3</product> <product>finesse:9.1%281%29_es4</product> <product>finesse:9.1%281%29_es5</product> <product>finesse:9.1%281%29_su1</product> <product>finesse:9.1%281%29_su1.1</product> <product>finesse:10.0%281%29_base</product> <product>finesse:10.0%281%29_su1</product> <product>finesse:10.0%281%29_su1.1</product> <product>finesse:10.5%281%29_base</product> <product>finesse:10.5%281%29_es1</product> <product>finesse:10.5%281%29_es2</product> <product>finesse:10.5%281%29_es3</product> <product>finesse:10.5%281%29_es4</product> <product>finesse:10.5%281%29_su1</product> <product>finesse:10.5%281%29_su1.1</product> <product>finesse:10.5%281%29_su1.7</product> <product>finesse:10.6%281%29_base</product> <product>finesse:10.6%281%29_su1</product> <product>finesse:10.6%281%29_su2</product> <product>finesse:11.0%281%29_base</product> </cve> <cve id="CVE-2016-1370" level="LOW"> <product>network_analysis_module_software:4.0.0</product> <product>network_analysis_module_software:4.1.0</product> </cve> <cve id="CVE-2016-9752" level="LOW"> <product>serendipity:2.0.4</product> </cve> <cve id="CVE-2016-2879" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> </cve> <cve id="CVE-2016-2878" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2871" level="LOW"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2870" level="LOW"> <product>websphere_datapower_xc10_appliance_firmware:2.1</product> <product>websphere_datapower_xc10_appliance_firmware:2.5</product> </cve> <cve id="CVE-2016-2873" level="LOW"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2872" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>security_qradar_incident_forensics:7.2.0</product> <product>security_qradar_incident_forensics:7.2.1</product> <product>security_qradar_incident_forensics:7.2.2</product> <product>security_qradar_incident_forensics:7.2.3</product> <product>security_qradar_incident_forensics:7.2.4</product> <product>security_qradar_incident_forensics:7.2.5</product> <product>security_qradar_incident_forensics:7.2.6</product> </cve> <cve id="CVE-2016-2875" level="LOW"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2874" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2877" level="LOW"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2876" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-5479" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> </cve> <cve id="CVE-2016-5470" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-5472" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-5473" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5474" level="LOW"> <product>retail_service_backbone:14.0</product> <product>retail_service_backbone:14.1</product> <product>retail_service_backbone:15.0</product> </cve> <cve id="CVE-2016-5475" level="LOW"> <product>retail_service_backbone:14.0</product> <product>retail_service_backbone:14.1</product> <product>retail_service_backbone:15.0</product> </cve> <cve id="CVE-2016-5476" level="LOW"> <product>retail_integration_bus:13.0</product> <product>retail_integration_bus:13.1</product> <product>retail_integration_bus:13.2</product> <product>retail_integration_bus:14.0</product> <product>retail_integration_bus:14.1</product> <product>retail_integration_bus:15.0</product> </cve> <cve id="CVE-2016-5477" level="LOW"> <product>glassfish_server:2.1.1</product> <product>glassfish_server:3.0.1</product> </cve> <cve id="CVE-2016-2299" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2298" level="LOW"> <product>web%27log_basic_100:-</product> <product>web%27log_light:-</product> <product>web%27log_pro:-</product> <product>web%27log_pro_unlimited:-</product> </cve> <cve id="CVE-2016-2295" level="LOW"> <product>miineport_e1_4641_firmware:1.1.10</product> <product>miineport_e1_7080_firmware:1.1.10</product> <product>miineport_e2_1242_firmware:1.1</product> <product>miineport_e2_4561_firmware:1.1</product> <product>miineport_e3_firmware:1.0</product> </cve> <cve id="CVE-2016-2294" level="LOW"> <product>acuvim_ii_net_firmware:3.08</product> <product>acuvim_iir_net_firmware:3.08</product> </cve> <cve id="CVE-2016-2297" level="LOW"> <product>web%27log_basic_100:-</product> <product>web%27log_light:-</product> <product>web%27log_pro:-</product> <product>web%27log_pro_unlimited:-</product> </cve> <cve id="CVE-2016-2296" level="LOW"> <product>web%27log_basic_100:-</product> <product>web%27log_light:-</product> <product>web%27log_pro:-</product> <product>web%27log_pro_unlimited:-</product> </cve> <cve id="CVE-2016-2291" level="MEDIUM"> <product>gp-pro_ex_ex-ed:4.0.4</product> <product>gp-pro_ex_pfxexedls:4.0.4</product> <product>gp-pro_ex_pfxexedv:4.0.4</product> <product>gp-pro_ex_pfxexgrpls:4.0.4</product> </cve> <cve id="CVE-2016-2290" level="MEDIUM"> <product>gp-pro_ex_ex-ed:4.0.4</product> <product>gp-pro_ex_pfxexedls:4.0.4</product> <product>gp-pro_ex_pfxexedv:4.0.4</product> <product>gp-pro_ex_pfxexgrpls:4.0.4</product> </cve> <cve id="CVE-2016-2293" level="LOW"> <product>acuvim_ii_net_firmware:3.08</product> <product>acuvim_iir_net_firmware:3.08</product> </cve> <cve id="CVE-2016-2292" level="MEDIUM"> <product>gp-pro_ex_ex-ed:4.0.4</product> <product>gp-pro_ex_pfxexedls:4.0.4</product> <product>gp-pro_ex_pfxexedv:4.0.4</product> <product>gp-pro_ex_pfxexgrpls:4.0.4</product> </cve> <cve id="CVE-2016-3740" level="MEDIUM"> <product>foxit_reader:7.3.4.311</product> </cve> <cve id="CVE-2016-6978" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6979" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6974" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6975" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6976" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6977" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6970" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6971" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6972" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6973" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3183" level="MEDIUM"> <product>openjpeg:2.1.0</product> </cve> <cve id="CVE-2016-3180" level="MEDIUM"> <product>tor_browser_launcher:0.2.3</product> </cve> <cve id="CVE-2016-3186" level="LOW"> <product>libtiff:4.0.6</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3187" level="LOW"> <product>prepopulate:7.x-2.0</product> <product>prepopulate:7.x-2.x</product> </cve> <cve id="CVE-2016-3188" level="LOW"> <product>prepopulate:7.x-2.0</product> <product>prepopulate:7.x-2.x</product> </cve> <cve id="CVE-2016-3189" level="MEDIUM"> <product>bzip2:1.0.6</product> </cve> <cve id="CVE-2016-7519" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7518" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7511" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-7510" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-7513" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7515" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7514" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7517" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7516" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-6608" level="MEDIUM"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6609" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6606" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6607" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6604" level="LOW"> <product>exynos_fimg2d:-</product> </cve> <cve id="CVE-2016-6605" level="LOW"> <product>cdh:5.2.0</product> <product>cdh:5.2.1</product> <product>cdh:5.2.2</product> <product>cdh:5.2.3</product> <product>cdh:5.2.4</product> <product>cdh:5.2.5</product> <product>cdh:5.2.6</product> <product>cdh:5.3.0</product> <product>cdh:5.3.1</product> <product>cdh:5.3.2</product> <product>cdh:5.3.3</product> <product>cdh:5.3.4</product> <product>cdh:5.3.5</product> <product>cdh:5.3.6</product> <product>cdh:5.3.7</product> <product>cdh:5.3.8</product> <product>cdh:5.3.9</product> <product>cdh:5.3.10</product> <product>cdh:5.4.0</product> <product>cdh:5.4.1</product> <product>cdh:5.4.2</product> <product>cdh:5.4.3</product> <product>cdh:5.4.4</product> <product>cdh:5.4.5</product> <product>cdh:5.4.6</product> <product>cdh:5.4.7</product> <product>cdh:5.4.8</product> <product>cdh:5.4.9</product> <product>cdh:5.4.10</product> <product>cdh:5.4.11</product> <product>cdh:5.5.0</product> <product>cdh:5.5.1</product> <product>cdh:5.5.2</product> <product>cdh:5.5.3</product> <product>cdh:5.5.4</product> <product>cdh:5.5.5</product> <product>cdh:5.5.6</product> <product>cdh:5.6.0</product> <product>cdh:5.6.1</product> <product>cdh:5.7.0</product> <product>cdh:5.7.1</product> <product>cdh:5.7.2</product> <product>cdh:5.8.0</product> </cve> <cve id="CVE-2016-6602" level="LOW"> <product>webnms_framework:5.2</product> <product>webnms_framework:5.2</product> </cve> <cve id="CVE-2016-6603" level="LOW"> <product>webnms_framework:5.2</product> <product>webnms_framework:5.2</product> </cve> <cve id="CVE-2016-6600" level="LOW"> <product>webnms_framework:5.2</product> <product>webnms_framework:5.2</product> </cve> <cve id="CVE-2016-6601" level="LOW"> <product>webnms_framework:5.2</product> <product>webnms_framework:5.2</product> </cve> <cve id="CVE-2016-0516" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-3089" level="MEDIUM"> <product>openmeetings:3.1.1</product> </cve> <cve id="CVE-2016-7419" level="MEDIUM"> <product>nextcloud_server:9.0.51</product> <product>owncloud:9.0.3</product> </cve> <cve id="CVE-2016-0189" level="HIGH"> <product>jscript:5.8</product> <product>vbscript:5.7</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-0188" level="MEDIUM"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0187" level="HIGH"> <product>jscript:5.8</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-0186" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-3087" level="LOW"> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>struts:2.3.28</product> </cve> <cve id="CVE-2016-3086" level="LOW"> <product>hadoop:2.6.0</product> <product>hadoop:2.6.1</product> <product>hadoop:2.6.2</product> <product>hadoop:2.6.3</product> <product>hadoop:2.6.4</product> <product>hadoop:2.7.0</product> <product>hadoop:2.7.1</product> <product>hadoop:2.7.2</product> </cve> <cve id="CVE-2016-5117" level="MEDIUM"> <product>openntpd:6.0</product> </cve> <cve id="CVE-2016-5115" level="MEDIUM"> <product>libavformat:57.34.103</product> </cve> <cve id="CVE-2016-9335" level="LOW"> <product>sixnet-managed_industrial_switches_firmware:5.0.196</product> <product>stride-managed_ethernet_switches_firmware:5.0.190</product> </cve> <cve id="CVE-2016-5119" level="HIGH"> <product>keepass:2.33</product> </cve> <cve id="CVE-2016-3331" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0769" level="LOW"> <product>eshop_plugin:6.3.14</product> </cve> <cve id="CVE-2016-8329" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0761" level="LOW"> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.16</product> <product>cloud_foundry_garden_linux:0.332.0</product> </cve> <cve id="CVE-2016-0760" level="LOW"> <product>sentry:1.5.1</product> <product>sentry:1.6.0</product> </cve> <cve id="CVE-2016-0767" level="LOW"> <product>postgre_sql_pl%2fjava:1.4.3</product> </cve> <cve id="CVE-2016-0765" level="MEDIUM"> <product>eshop_plugin:6.3.14</product> </cve> <cve id="CVE-2016-0764" level="LOW"> <product>network_manager:1.0.8</product> </cve> <cve id="CVE-2016-9377" level="LOW"> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.5.5</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.6.4</product> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9804" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9807" level="MEDIUM"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9801" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9800" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9803" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9802" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-8610" level="LOW"> <product>openssl:0.9.8</product> <product>openssl:1.0.1</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> <product>openssl:1.0.2g</product> <product>openssl:1.0.2h</product> <product>openssl:1.1.0</product> </cve> <cve id="CVE-2016-9809" level="MEDIUM"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9808" level="LOW"> <product>gstreamer:1.10.1</product> </cve> <cve id="CVE-2016-9379" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen</product> </cve> <cve id="CVE-2016-9378" level="LOW"> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.5.5</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.6.4</product> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-10136" level="LOW"> <product>adups_fota:-</product> </cve> <cve id="CVE-2016-10137" level="LOW"> <product>adups_fota:-</product> </cve> <cve id="CVE-2016-10134" level="LOW"> <product>zabbix:2.2.13</product> <product>zabbix:3.0.0</product> <product>zabbix:3.0.1</product> <product>zabbix:3.0.2</product> <product>zabbix:3.0.3</product> </cve> <cve id="CVE-2016-10135" level="MEDIUM"> <product>lg_mobile:5.0</product> <product>lg_mobile:5.1</product> <product>lg_mobile:6.0</product> <product>lg_mobile:6.0.1</product> <product>lg_mobile:7.0</product> </cve> <cve id="CVE-2016-10132" level="LOW"> <product>mujs</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-10133" level="LOW"> <product>mujs</product> </cve> <cve id="CVE-2016-10130" level="MEDIUM"> <product>libgit2:0.24.5</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> <product>libgit2:0.25.0</product> </cve> <cve id="CVE-2016-10131" level="LOW"> <product>codeigniter:3.1.2</product> </cve> <cve id="CVE-2016-10680" level="MEDIUM"> <product>adamvr-geoip-lite:1.2.0</product> </cve> <cve id="CVE-2016-10681" level="MEDIUM"> <product>roslibjs:0.18.0</product> </cve> <cve id="CVE-2016-10682" level="MEDIUM"> <product>massif:0.0.1-1</product> </cve> <cve id="CVE-2016-10683" level="MEDIUM"> <product>arcanist:0.0.1</product> </cve> <cve id="CVE-2016-10684" level="MEDIUM"> <product>healthcenter:3.0.3</product> </cve> <cve id="CVE-2016-10685" level="MEDIUM"> <product>pk-app-wonderbox:1.0.0</product> </cve> <cve id="CVE-2016-10138" level="LOW"> <product>adups_fota:-</product> </cve> <cve id="CVE-2016-10139" level="LOW"> <product>adups_fota:-</product> </cve> <cve id="CVE-2016-5801" level="LOW"> <product>omniview:1.2</product> </cve> <cve id="CVE-2016-5803" level="LOW"> <product>unified_infrastructure_management:8.47</product> </cve> <cve id="CVE-2016-5802" level="MEDIUM"> <product>ispsoft:-</product> <product>pmsoft:-</product> <product>wplsoft:-</product> </cve> <cve id="CVE-2016-5805" level="MEDIUM"> <product>ispsoft:-</product> <product>pmsoft:-</product> <product>wplsoft:-</product> </cve> <cve id="CVE-2016-5804" level="LOW"> <product>mgate_mb3170_router_firmware:2.4</product> <product>mgate_mb3180_router_firmware:1.7</product> <product>mgate_mb3270_router_firmware:2.6</product> <product>mgate_mb3280_router_firmware:2.6</product> <product>mgate_mb3480_router_firmware:2.5</product> </cve> <cve id="CVE-2016-5807" level="LOW"> <product>lighthouse_sms:5.1</product> </cve> <cve id="CVE-2016-5809" level="MEDIUM"> <product>ion5000:-</product> <product>ion7300:-</product> <product>ion7500:-</product> <product>ion7600:-</product> <product>ion8650:-</product> <product>ion8800:-</product> </cve> <cve id="CVE-2016-8785" level="MEDIUM"> <product>s12700_firmware:v200r007c00</product> <product>s12700_firmware:v200r008c00</product> <product>s5700_firmware:v200r007c00</product> <product>s7700_firmware:v200r002c00</product> <product>s7700_firmware:v200r005c00</product> <product>s7700_firmware:v200r006c00</product> <product>s7700_firmware:v200r007c00</product> <product>s7700_firmware:v200r008c00</product> <product>s9700_firmware:v200r007c00</product> </cve> <cve id="CVE-2016-0421" level="LOW"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-8784" level="LOW"> <product>cloudengine_12800_firmware:v100r003c00</product> <product>cloudengine_12800_firmware:v100r003c10</product> <product>cloudengine_12800_firmware:v100r005c00</product> <product>cloudengine_12800_firmware:v100r005c10</product> <product>cloudengine_12800_firmware:v100r006c00</product> </cve> <cve id="CVE-2016-2538" level="LOW"> <product>qemu:2.5.0</product> </cve> <cve id="CVE-2016-10350" level="MEDIUM"> <product>libarchive:3.2.2</product> </cve> <cve id="CVE-2016-10351" level="LOW"> <product>telegram_desktop:0.10.19</product> </cve> <cve id="CVE-2016-2539" level="MEDIUM"> <product>atutor:2.2.1</product> </cve> <cve id="CVE-2016-5335" level="LOW"> <product>identity_manger:2.0</product> <product>identity_manger:2.1.0</product> <product>identity_manger:2.1.1</product> <product>identity_manger:2.4</product> <product>identity_manger:2.6</product> <product>vrealize_automation:7.0</product> <product>vrealize_automation:7.0.1</product> </cve> <cve id="CVE-2016-5332" level="LOW"> <product>vrealize_log_insight:2.0</product> <product>vrealize_log_insight:2.0.5</product> <product>vrealize_log_insight:2.5</product> <product>vrealize_log_insight:3.0</product> <product>vrealize_log_insight:3.3</product> </cve> <cve id="CVE-2016-5331" level="MEDIUM"> <product>vcenter_server:6.0</product> <product>esxi:6.0</product> </cve> <cve id="CVE-2016-4796" level="MEDIUM"> <product>openjpeg:2.1.0</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-4607" level="LOW"> <product>libxslt</product> </cve> <cve id="CVE-2016-4797" level="MEDIUM"> <product>openjpeg:2.1.0</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-4608" level="LOW"> <product>libxslt</product> </cve> <cve id="CVE-2016-4609" level="LOW"> <product>libxslt</product> </cve> <cve id="CVE-2016-1320" level="LOW"> <product>prime_collaboration:9.0.0</product> <product>prime_collaboration:9.0.5</product> <product>prime_collaboration:11.0.0</product> </cve> <cve id="CVE-2016-1321" level="LOW"> <product>universal_small_cell_firmware:r2.12_base</product> <product>universal_small_cell_firmware:r2.13_base</product> <product>universal_small_cell_firmware:r2.14_base</product> <product>universal_small_cell_firmware:r2.15_base</product> <product>universal_small_cell_firmware:r2.16_base</product> <product>universal_small_cell_firmware:r2.17_base</product> <product>universal_small_cell_firmware:r3.2_base</product> <product>universal_small_cell_firmware:r3.3_base</product> <product>universal_small_cell_firmware:r3.4_1.1</product> <product>universal_small_cell_firmware:r3.4_2.1</product> <product>universal_small_cell_firmware:r3.4_2.17</product> <product>universal_small_cell_firmware:r3.4_base</product> <product>universal_small_cell_firmware:r3.5_base</product> </cve> <cve id="CVE-2016-4790" level="MEDIUM"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-4791" level="LOW"> <product>pulse_connect_secure:7.4</product> <product>pulse_connect_secure:7.4r1.0</product> <product>pulse_connect_secure:7.4r2.0</product> <product>pulse_connect_secure:7.4r3.0</product> <product>pulse_connect_secure:7.4r4.0</product> <product>pulse_connect_secure:7.4r5.0</product> <product>pulse_connect_secure:7.4r6.0</product> <product>pulse_connect_secure:7.4r7.0</product> <product>pulse_connect_secure:7.4r8.0</product> <product>pulse_connect_secure:7.4r9.0</product> <product>pulse_connect_secure:7.4r9.1</product> <product>pulse_connect_secure:7.4r9.2</product> <product>pulse_connect_secure:7.4r9.3</product> <product>pulse_connect_secure:7.4r10.0</product> <product>pulse_connect_secure:7.4r11.0</product> <product>pulse_connect_secure:7.4r11.1</product> <product>pulse_connect_secure:7.4r12.0</product> <product>pulse_connect_secure:7.4r13.0</product> <product>pulse_connect_secure:7.4r13.1</product> <product>pulse_connect_secure:7.4r13.2</product> <product>pulse_connect_secure:7.4r13.3</product> <product>pulse_connect_secure:8.0</product> <product>pulse_connect_secure:8.0r1.0</product> <product>pulse_connect_secure:8.0r1.1</product> <product>pulse_connect_secure:8.0r2.0</product> <product>pulse_connect_secure:8.0r3.0</product> <product>pulse_connect_secure:8.0r3.1</product> <product>pulse_connect_secure:8.0r3.2</product> <product>pulse_connect_secure:8.0r4.0</product> <product>pulse_connect_secure:8.0r4.1</product> <product>pulse_connect_secure:8.0r5.0</product> <product>pulse_connect_secure:8.0r6.0</product> <product>pulse_connect_secure:8.0r7.0</product> <product>pulse_connect_secure:8.0r7.1</product> <product>pulse_connect_secure:8.0r8.0</product> <product>pulse_connect_secure:8.0r8.1</product> <product>pulse_connect_secure:8.1</product> <product>pulse_connect_secure:8.1r1.0</product> <product>pulse_connect_secure:8.1r1.1</product> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-0602" level="HIGH"> <product>vm_virtualbox:5.0.12</product> </cve> <cve id="CVE-2016-0603" level="HIGH"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-6033" level="MEDIUM"> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.0.0</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.1</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.2</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.3</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4.0</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.4.1</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.6</product> <product>tivoli_storage_flashcopy_manager_for_vmware:4.1.6.0</product> <product>your_sha256_hashfor_vmware:7.1.0</product> <product>your_sha256_hashfor_vmware:7.1.1</product> <product>your_sha256_hashfor_vmware:7.1.2</product> <product>your_sha256_hashfor_vmware:7.1.3</product> <product>your_sha256_hashfor_vmware:7.1.4</product> <product>your_sha256_hashfor_vmware:7.1.4.0</product> <product>your_sha256_hashfor_vmware:7.1.6</product> <product>your_sha256_hashfor_vmware:7.1.6.2</product> <product>your_sha256_hashfor_vmware:7.1.6.3</product> </cve> <cve id="CVE-2016-6032" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> </cve> <cve id="CVE-2016-9085" level="LOW"> <product>libwebp:-</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-6035" level="MEDIUM"> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-6034" level="LOW"> <product>your_sha256_hashfor_vmware:7.1.3</product> <product>your_sha256_hashfor_vmware:7.1.4</product> <product>your_sha256_hashfor_vmware:7.1.4.0</product> <product>your_sha256_hashfor_vmware:7.1.6</product> <product>your_sha256_hashfor_vmware:7.1.6.2</product> <product>your_sha256_hashfor_vmware:7.1.6.3</product> </cve> <cve id="CVE-2016-9087" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-10317" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-10311" level="LOW"> <product>netweaver:7.0</product> <product>netweaver:7.0</product> <product>netweaver:7.0</product> <product>netweaver:7.0</product> <product>netweaver:7.3</product> <product>netweaver:7.3</product> <product>netweaver:7.4</product> <product>netweaver:7.5</product> </cve> <cve id="CVE-2016-0240" level="MEDIUM"> <product>security_guardium_database_activity_monitor:8.2</product> <product>security_guardium_database_activity_monitor:9.0</product> <product>security_guardium_database_activity_monitor:9.1</product> <product>security_guardium_database_activity_monitor:9.5</product> <product>security_guardium_database_activity_monitor:10.0</product> <product>security_guardium_database_activity_monitor:10.1</product> </cve> <cve id="CVE-2016-8763" level="MEDIUM"> <product>p8_lite_firmware:ale-l02c636b150</product> <product>p9_firmware:-</product> <product>p9_lite_firmware:vns-l21c185b130</product> </cve> <cve id="CVE-2016-8762" level="MEDIUM"> <product>p8_lite_firmware:ale-l02c636b150</product> <product>p9_firmware:-</product> <product>p9_lite_firmware:vns-l21c185b130</product> </cve> <cve id="CVE-2016-8761" level="MEDIUM"> <product>honor_6_firmware:-</product> <product>p9_firmware:-</product> <product>p9_plus_firmware:-</product> </cve> <cve id="CVE-2016-8760" level="MEDIUM"> <product>honor_6_firmware:-</product> <product>p9_firmware:-</product> <product>p9_plus_firmware:-</product> </cve> <cve id="CVE-2016-0518" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-7239" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-8764" level="MEDIUM"> <product>p8_lite_firmware:ale-l02c636b150</product> <product>p9_firmware:-</product> <product>p9_lite_firmware:vns-l21c185b130</product> </cve> <cve id="CVE-2016-0514" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-0515" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-8769" level="LOW"> <product>utps_firmware:v200r003b015d15sp00c983</product> </cve> <cve id="CVE-2016-8768" level="MEDIUM"> <product>honor_6_firmware:-</product> <product>honor_6_plus_firmware:-</product> <product>honor_7_firmware:-</product> </cve> <cve id="CVE-2016-0510" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-0511" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-0512" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-0513" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-1179" level="MEDIUM"> <product>a-blog_cms:2.6.0.1</product> </cve> <cve id="CVE-2016-1178" level="LOW"> <product>a-blog_cms:2.6.0.1</product> </cve> <cve id="CVE-2016-9490" level="MEDIUM"> <product>applications_manager:12.0</product> <product>applications_manager:13.0</product> </cve> <cve id="CVE-2016-9491" level="LOW"> <product>manageengine_applications_manager:12.0</product> <product>manageengine_applications_manager:13.0</product> </cve> <cve id="CVE-2016-9496" level="LOW"> <product>dw7000_firmware:6.9.0.34</product> <product>hn7000s_firmware:6.9.0.34</product> <product>hn7000sm_firmware:6.9.0.34</product> <product>hn7740s_firmware:6.9.0.34</product> </cve> <cve id="CVE-2016-9497" level="LOW"> <product>dw7000_firmware:6.9.0.34</product> <product>hn7000s_firmware:6.9.0.34</product> <product>hn7000sm_firmware:6.9.0.34</product> <product>hn7740s_firmware:6.9.0.34</product> </cve> <cve id="CVE-2016-9494" level="LOW"> <product>dw7000_firmware:6.9.0.34</product> <product>hn7000s_firmware:6.9.0.34</product> <product>hn7000sm_firmware:6.9.0.34</product> <product>hn7740s_firmware:6.9.0.34</product> </cve> <cve id="CVE-2016-9495" level="LOW"> <product>dw7000_firmware:6.9.0.34</product> <product>hn7000s_firmware:6.9.0.34</product> <product>hn7000sm_firmware:6.9.0.34</product> <product>hn7740s_firmware:6.9.0.34</product> </cve> <cve id="CVE-2016-1171" level="MEDIUM"> <product>casebook_plugin:0.9.2</product> </cve> <cve id="CVE-2016-1170" level="MEDIUM"> <product>casebook_plugin:0.9.3</product> </cve> <cve id="CVE-2016-1173" level="MEDIUM"> <product>casebook_plugin:0.9.2</product> </cve> <cve id="CVE-2016-1172" level="MEDIUM"> <product>casebook_plugin:0.9.2</product> </cve> <cve id="CVE-2016-1175" level="MEDIUM"> <product>aquos_hn-pp150_firmware:1.02.00.04</product> <product>aquos_hn-pp150_firmware:1.03.01.04</product> </cve> <cve id="CVE-2016-1174" level="MEDIUM"> <product>casebook_plugin:0.9.2</product> </cve> <cve id="CVE-2016-1177" level="MEDIUM"> <product>wisepoint:4.3.1</product> <product>wisepoint_authenticator:4.1.19.22</product> </cve> <cve id="CVE-2016-1176" level="MEDIUM"> <product>eva_animator:-</product> </cve> <cve id="CVE-2016-3191" level="LOW"> <product>pcre:8.00</product> <product>pcre:8.01</product> <product>pcre:8.02</product> <product>pcre:8.10</product> <product>pcre:8.11</product> <product>pcre:8.12</product> <product>pcre:8.13</product> <product>pcre:8.20</product> <product>pcre:8.21</product> <product>pcre:8.30</product> <product>pcre:8.31</product> <product>pcre:8.32</product> <product>pcre:8.33</product> <product>pcre:8.34</product> <product>pcre:8.35</product> <product>pcre:8.36</product> <product>pcre:8.37</product> <product>pcre:8.38</product> <product>pcre2:10.21</product> </cve> <cve id="CVE-2016-1395" level="LOW"> <product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product> <product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product> </cve> <cve id="CVE-2016-1394" level="LOW"> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> <product>firesight_system_software:6.1.0</product> </cve> <cve id="CVE-2016-1397" level="LOW"> <product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product> <product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product> </cve> <cve id="CVE-2016-1396" level="MEDIUM"> <product>rv110w_wireless-n_vpn_firewall_firmware:1.1.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.9</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.0.10</product> <product>rv110w_wireless-n_vpn_firewall_firmware:1.2.1.4</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.0.21</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.1.3</product> <product>rv130w_wireless-n_multifunction_vpn_router_firmware:1.0.2.7</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.5</product> <product>rv215w_wireless-n_vpn_router_firmware:1.1.0.6</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.14</product> <product>rv215w_wireless-n_vpn_router_firmware:1.2.0.15</product> <product>rv215w_wireless-n_vpn_router_firmware:1.3.0.7</product> </cve> <cve id="CVE-2016-1391" level="LOW"> <product>prime_network_analysis_module_software:5.0.0</product> <product>prime_network_analysis_module_software:5.0.1</product> <product>prime_network_analysis_module_software:5.0.2</product> <product>prime_network_analysis_module_software:5.1.0</product> <product>prime_network_analysis_module_software:5.1.2</product> <product>prime_network_analysis_module_software:6.0.2</product> <product>prime_network_analysis_module_software:6.1.0</product> <product>prime_network_analysis_module_software:6.1.1</product> <product>prime_network_analysis_module_software:6.2.0</product> <product>prime_virtual_network_analysis_module_software:6.0.0</product> <product>prime_virtual_network_analysis_module_software:6.1.0</product> <product>prime_virtual_network_analysis_module_software:6.2.0</product> <product>prime_virtual_network_analysis_module_software:6.2.1</product> </cve> <cve id="CVE-2016-1390" level="LOW"> <product>prime_network_analysis_module_software:5.0.0</product> <product>prime_network_analysis_module_software:5.0.1</product> <product>prime_network_analysis_module_software:5.0.2</product> <product>prime_network_analysis_module_software:5.1.0</product> <product>prime_network_analysis_module_software:5.1.2</product> <product>prime_network_analysis_module_software:6.0.2</product> <product>prime_network_analysis_module_software:6.1.0</product> <product>prime_network_analysis_module_software:6.1.1</product> <product>prime_network_analysis_module_software:6.2.0</product> <product>prime_virtual_network_analysis_module_software:6.0.0</product> <product>prime_virtual_network_analysis_module_software:6.1.0</product> <product>prime_virtual_network_analysis_module_software:6.2.0</product> </cve> <cve id="CVE-2016-1393" level="LOW"> <product>cloud_network_automation_provisioner:1.0</product> <product>cloud_network_automation_provisioner:1.1</product> </cve> <cve id="CVE-2016-1392" level="MEDIUM"> <product>prime_collaboration_assurance:10.5.0</product> <product>prime_collaboration_assurance:10.5.1</product> <product>prime_collaboration_assurance:10.6.0</product> <product>prime_collaboration_assurance:11.0.0</product> </cve> <cve id="CVE-2016-1398" level="LOW"> <product>rv110w_firmware:1.1.0.9</product> <product>rv110w_firmware:1.2.0.9</product> <product>rv110w_firmware:1.2.0.10</product> <product>rv110w_firmware:1.2.1.4</product> <product>rv130w_firmware:1.0.0.21</product> <product>rv130w_firmware:1.0.1.3</product> <product>rv130w_firmware:1.0.2.7</product> <product>rv215w_firmware:1.1.0.5</product> <product>rv215w_firmware:1.1.0.6</product> <product>rv215w_firmware:1.2.0.14</product> <product>rv215w_firmware:1.2.0.15</product> <product>rv215w_firmware:1.3.0.7</product> </cve> <cve id="CVE-2016-3190" level="LOW"> <product>cairo:1.12.16</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3407" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-9148" level="MEDIUM"> <product>service_desk_manager:12.9</product> <product>service_desk_manager:14.1</product> </cve> <cve id="CVE-2016-9149" level="LOW"> <product>pan-os:5.0.19</product> <product>pan-os:5.1.12</product> <product>pan-os:6.0.14</product> <product>pan-os:6.1.14</product> <product>pan-os:7.0.10</product> <product>pan-os:7.1.5</product> </cve> <cve id="CVE-2016-2855" level="LOW"> <product>mobile_broadband_hl_service:22.001.25.00.03</product> </cve> <cve id="CVE-2016-3195" level="MEDIUM"> <product>fortianalyzer_firmware:5.0.0</product> <product>fortianalyzer_firmware:5.0.2</product> <product>fortianalyzer_firmware:5.0.3</product> <product>fortianalyzer_firmware:5.0.4</product> <product>fortianalyzer_firmware:5.0.5</product> <product>fortianalyzer_firmware:5.0.6</product> <product>fortianalyzer_firmware:5.0.7</product> <product>fortianalyzer_firmware:5.0.8</product> <product>fortianalyzer_firmware:5.0.9</product> <product>fortianalyzer_firmware:5.0.10</product> <product>fortianalyzer_firmware:5.0.11</product> <product>fortianalyzer_firmware:5.0.12</product> <product>fortianalyzer_firmware:5.2.0</product> <product>fortianalyzer_firmware:5.2.1</product> <product>fortianalyzer_firmware:5.2.2</product> <product>fortianalyzer_firmware:5.2.3</product> <product>fortianalyzer_firmware:5.2.4</product> <product>fortianalyzer_firmware:5.2.5</product> <product>fortimanager_firmware:5.0.0</product> <product>fortimanager_firmware:5.0.1</product> <product>fortimanager_firmware:5.0.2</product> <product>fortimanager_firmware:5.0.3</product> <product>fortimanager_firmware:5.0.4</product> <product>fortimanager_firmware:5.0.5</product> <product>fortimanager_firmware:5.0.6</product> <product>fortimanager_firmware:5.0.7</product> <product>fortimanager_firmware:5.0.8</product> <product>fortimanager_firmware:5.0.9</product> <product>fortimanager_firmware:5.0.10</product> <product>fortimanager_firmware:5.0.11</product> <product>fortimanager_firmware:5.2.0</product> <product>fortimanager_firmware:5.2.1</product> <product>fortimanager_firmware:5.2.2</product> <product>fortimanager_firmware:5.2.3</product> <product>fortimanager_firmware:5.2.4</product> <product>fortimanager_firmware:5.2.5</product> </cve> <cve id="CVE-2016-9638" level="LOW"> <product>patrol:9.13.10.01</product> </cve> <cve id="CVE-2016-2850" level="LOW"> <product>botan:1.11.0</product> <product>botan:1.11.1</product> <product>botan:1.11.2</product> <product>botan:1.11.3</product> <product>botan:1.11.4</product> <product>botan:1.11.5</product> <product>botan:1.11.6</product> <product>botan:1.11.7</product> <product>botan:1.11.8</product> <product>botan:1.11.9</product> <product>botan:1.11.10</product> <product>botan:1.11.11</product> <product>botan:1.11.12</product> <product>botan:1.11.13</product> <product>botan:1.11.14</product> <product>botan:1.11.15</product> <product>botan:1.11.16</product> <product>botan:1.11.17</product> <product>botan:1.11.18</product> <product>botan:1.11.19</product> <product>botan:1.11.20</product> <product>botan:1.11.21</product> <product>botan:1.11.22</product> <product>botan:1.11.23</product> <product>botan:1.11.24</product> <product>botan:1.11.25</product> <product>botan:1.11.26</product> <product>botan:1.11.27</product> <product>botan:1.11.28</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-9637" level="HIGH"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> </cve> <cve id="CVE-2016-9632" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9633" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9630" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9147" level="LOW"> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> </cve> <cve id="CVE-2016-3406" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-6336" level="LOW"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-5497" level="MEDIUM"> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-3194" level="MEDIUM"> <product>fortianalyzer_firmware:5.0.0</product> <product>fortianalyzer_firmware:5.0.2</product> <product>fortianalyzer_firmware:5.0.3</product> <product>fortianalyzer_firmware:5.0.4</product> <product>fortianalyzer_firmware:5.0.5</product> <product>fortianalyzer_firmware:5.0.6</product> <product>fortianalyzer_firmware:5.0.7</product> <product>fortianalyzer_firmware:5.0.8</product> <product>fortianalyzer_firmware:5.0.9</product> <product>fortianalyzer_firmware:5.0.10</product> <product>fortianalyzer_firmware:5.0.11</product> <product>fortianalyzer_firmware:5.0.12</product> <product>fortianalyzer_firmware:5.2.0</product> <product>fortianalyzer_firmware:5.2.1</product> <product>fortianalyzer_firmware:5.2.2</product> <product>fortianalyzer_firmware:5.2.3</product> <product>fortianalyzer_firmware:5.2.4</product> <product>fortianalyzer_firmware:5.2.5</product> <product>fortimanager_firmware:5.0.0</product> <product>fortimanager_firmware:5.0.1</product> <product>fortimanager_firmware:5.0.2</product> <product>fortimanager_firmware:5.0.3</product> <product>fortimanager_firmware:5.0.4</product> <product>fortimanager_firmware:5.0.5</product> <product>fortimanager_firmware:5.0.6</product> <product>fortimanager_firmware:5.0.7</product> <product>fortimanager_firmware:5.0.8</product> <product>fortimanager_firmware:5.0.9</product> <product>fortimanager_firmware:5.0.10</product> <product>fortimanager_firmware:5.0.11</product> <product>fortimanager_firmware:5.2.0</product> <product>fortimanager_firmware:5.2.1</product> <product>fortimanager_firmware:5.2.2</product> <product>fortimanager_firmware:5.2.3</product> <product>fortimanager_firmware:5.2.4</product> <product>fortimanager_firmware:5.2.5</product> </cve> <cve id="CVE-2016-5495" level="LOW"> <product>discoverer:11.1.1.7.0</product> </cve> <cve id="CVE-2016-5492" level="LOW"> <product>sun_zfs_storage_appliance_kit:ak_2013</product> </cve> <cve id="CVE-2016-5493" level="MEDIUM"> <product>flexcube_private_banking:12.0.1</product> <product>flexcube_private_banking:12.0.2</product> <product>flexcube_private_banking:12.0.3</product> </cve> <cve id="CVE-2016-5490" level="LOW"> <product>flexcube_universal_banking:11.4.0</product> </cve> <cve id="CVE-2016-5491" level="MEDIUM"> <product>commerce_service_center:10.0.3.5</product> <product>commerce_service_center:10.2.0.5</product> </cve> <cve id="CVE-2016-0249" level="LOW"> <product>security_guardium:8.2</product> <product>security_guardium:9.0</product> <product>security_guardium:9.1</product> <product>security_guardium:9.5</product> <product>security_guardium:10.0</product> <product>security_guardium:10.0.1</product> <product>security_guardium:10.1.0</product> </cve> <cve id="CVE-2016-3196" level="MEDIUM"> <product>fortianalyzer_firmware:5.0.0</product> <product>fortianalyzer_firmware:5.0.1</product> <product>fortianalyzer_firmware:5.0.4</product> <product>fortianalyzer_firmware:5.0.5</product> <product>fortianalyzer_firmware:5.0.10</product> <product>fortianalyzer_firmware:5.2.0</product> <product>fortianalyzer_firmware:5.2.1</product> <product>fortianalyzer_firmware:5.2.2</product> <product>fortianalyzer_firmware:5.2.3</product> <product>fortianalyzer_firmware:5.2.4</product> <product>fortianalyzer_firmware:5.2.5</product> <product>fortimanager_firmware:5.0.3</product> <product>fortimanager_firmware:5.0.4</product> <product>fortimanager_firmware:5.0.5</product> <product>fortimanager_firmware:5.0.6</product> <product>fortimanager_firmware:5.0.7</product> <product>fortimanager_firmware:5.0.8</product> <product>fortimanager_firmware:5.0.9</product> <product>fortimanager_firmware:5.0.10</product> <product>fortimanager_firmware:5.2.0</product> <product>fortimanager_firmware:5.2.1</product> <product>fortimanager_firmware:5.2.2</product> <product>fortimanager_firmware:5.2.3</product> <product>fortimanager_firmware:5.2.4</product> <product>fortimanager_firmware:5.2.5</product> </cve> <cve id="CVE-2016-3984" level="LOW"> <product>active_response:1.1.0.158</product> <product>agent:5.0.2.285</product> <product>data_exchange_layer:2.0.0.430.1</product> <product>data_loss_prevention_endpoint:9.3.0</product> <product>data_loss_prevention_endpoint:9.4.0</product> <product>endpoint_security:10.0.1</product> <product>host_intrusion_prevention:8.0.0</product> <product>virusscan_enterprise:8.8.0</product> </cve> <cve id="CVE-2016-3403" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3985" level="LOW"> <product>pulse_connect_secure:8.1r7</product> <product>pulse_connect_secure:8.2r1</product> </cve> <cve id="CVE-2016-2141" level="LOW"> <product>jboss_enterprise_application_platform:5.2</product> <product>jboss_enterprise_application_platform:6.4</product> <product>jboss_enterprise_application_platform:7.0</product> <product>jgroups:-</product> </cve> <cve id="CVE-2016-2140" level="MEDIUM"> <product>compute:12.0.0</product> <product>compute:12.0.1</product> <product>compute:12.0.2</product> <product>compute:2015.1.3</product> </cve> <cve id="CVE-2016-2142" level="LOW"> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-2145" level="LOW"> <product>mod_auth_mellon:0.11.0</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2147" level="LOW"> <product>busybox:1.24.2</product> </cve> <cve id="CVE-2016-2146" level="LOW"> <product>mod_auth_mellon:0.11.0</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2149" level="LOW"> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-2148" level="LOW"> <product>busybox:1.24.2</product> </cve> <cve id="CVE-2016-3400" level="MEDIUM"> <product>data_ontap:8.1</product> <product>data_ontap:8.2</product> </cve> <cve id="CVE-2016-6330" level="LOW"> <product>jboss_operations_network:3.0</product> <product>jboss_operations_network:3.0.1</product> <product>jboss_operations_network:3.1</product> <product>jboss_operations_network:3.1.1</product> <product>jboss_operations_network:3.1.2</product> <product>jboss_operations_network:3.1.4</product> <product>jboss_operations_network:3.2.0</product> <product>jboss_operations_network:3.2.1</product> <product>jboss_operations_network:3.2.2</product> <product>jboss_operations_network:3.2.3</product> <product>jboss_operations_network:3.3.1</product> <product>jboss_operations_network:3.3.2</product> <product>jboss_operations_network:3.3.3</product> <product>jboss_operations_network:3.3.4</product> <product>jboss_operations_network:3.3.5</product> <product>jboss_operations_network:3.3.6</product> </cve> <cve id="CVE-2016-3438" level="LOW"> <product>configurator:12.1</product> <product>configurator:12.2</product> </cve> <cve id="CVE-2016-3439" level="MEDIUM"> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-3432" level="MEDIUM"> <product>business_intelligence_publisher:11.1.1.7.0</product> <product>business_intelligence_publisher:11.1.1.9.0</product> </cve> <cve id="CVE-2016-3433" level="MEDIUM"> <product>business_intelligence:11.1.1.7.0</product> <product>business_intelligence:11.1.1.9.0</product> </cve> <cve id="CVE-2016-3431" level="HIGH"> <product>agile_product_lifecycle_management_framework:9.3.1.1</product> <product>agile_product_lifecycle_management_framework:9.3.1.2</product> <product>agile_product_lifecycle_management_framework:9.3.2</product> <product>agile_product_lifecycle_management_framework:9.3.3</product> </cve> <cve id="CVE-2016-3436" level="MEDIUM"> <product>common_applications_calendar:12.1.1</product> <product>common_applications_calendar:12.1.2</product> <product>common_applications_calendar:12.1.3</product> </cve> <cve id="CVE-2016-6917" level="LOW"> <product>video_driver:-</product> <product>shield_tablet_firmware:4.3.0</product> <product>shield_tablet_tk1_firmware:1.4.0</product> <product>shield_tv_firmware:3.2</product> </cve> <cve id="CVE-2016-6914" level="LOW"> <product>unifi_video:2.1.3</product> <product>unifi_video:3.0.1</product> </cve> <cve id="CVE-2016-3435" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-6331" level="LOW"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-7537" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7536" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7535" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7534" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7533" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7532" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7531" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7530" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-7539" level="LOW"> <product>imagemagick:6.9.9-3</product> </cve> <cve id="CVE-2016-7538" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-6624" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6625" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6626" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6627" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6620" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6621" level="LOW"> <product>phpmyadmin:4.0.10.18</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.4.15.9</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.4</product> <product>phpmyadmin:4.6.5</product> </cve> <cve id="CVE-2016-6622" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6623" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6628" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6629" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-3165" level="LOW"> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.0</product> <product>drupal:6.1</product> <product>drupal:6.2</product> <product>drupal:6.3</product> <product>drupal:6.4</product> <product>drupal:6.5</product> <product>drupal:6.6</product> <product>drupal:6.7</product> <product>drupal:6.8</product> <product>drupal:6.9</product> <product>drupal:6.10</product> <product>drupal:6.11</product> <product>drupal:6.12</product> <product>drupal:6.13</product> <product>drupal:6.14</product> <product>drupal:6.15</product> <product>drupal:6.16</product> <product>drupal:6.17</product> <product>drupal:6.18</product> <product>drupal:6.19</product> <product>drupal:6.20</product> <product>drupal:6.21</product> <product>drupal:6.22</product> <product>drupal:6.23</product> <product>drupal:6.24</product> <product>drupal:6.25</product> <product>drupal:6.26</product> <product>drupal:6.27</product> <product>drupal:6.28</product> <product>drupal:6.29</product> <product>drupal:6.30</product> <product>drupal:6.31</product> <product>drupal:6.32</product> <product>drupal:6.33</product> <product>drupal:6.34</product> <product>drupal:6.35</product> <product>drupal:6.36</product> <product>drupal:6.37</product> </cve> <cve id="CVE-2016-1559" level="HIGH"> <product>dap-1353_h%2fw_b1_firmware:3.15</product> <product>dap-2553_h%2fw_a1_firmware:1.31</product> <product>dap-3520_h%2fw_a1_firmware:1.16</product> </cve> <cve id="CVE-2016-3161" level="LOW"> <product>geforce_experience:-</product> </cve> <cve id="CVE-2016-0164" level="HIGH"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7399" level="LOW"> <product>netbackup_appliance_firmware:2.6.0.0</product> <product>netbackup_appliance_firmware:2.6.0.1</product> <product>netbackup_appliance_firmware:2.6.0.2</product> <product>netbackup_appliance_firmware:2.6.0.3</product> <product>netbackup_appliance_firmware:2.6.0.4</product> <product>netbackup_appliance_firmware:2.6.1.0</product> <product>netbackup_appliance_firmware:2.6.1.1</product> <product>netbackup_appliance_firmware:2.6.1.2</product> <product>netbackup_appliance_firmware:2.7.0.0</product> <product>netbackup_appliance_firmware:2.7.1.0</product> <product>netbackup_appliance_firmware:2.7.2.0</product> <product>netbackup_appliance_firmware:3.0.0.0</product> </cve> <cve id="CVE-2016-0166" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0161" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-0160" level="LOW"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0162" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7393" level="MEDIUM"> <product>libav:11.4</product> </cve> <cve id="CVE-2016-7392" level="MEDIUM"> <product>autotrace:0.31.1</product> </cve> <cve id="CVE-2016-7391" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7390" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-7397" level="LOW"> <product>unified_threat_management_software:9.405-5</product> </cve> <cve id="CVE-2016-7394" level="MEDIUM"> <product>tikiwiki_cms%2fgroupware:15.2</product> </cve> <cve id="CVE-2016-1557" level="LOW"> <product>wnap320_firmware:3.0.5.0</product> <product>wndap350_firmware:3.0.5.0</product> <product>wndap360_firmware:3.0.5.0</product> </cve> <cve id="CVE-2016-1556" level="LOW"> <product>wn604_firmware:3.3.2</product> <product>wnap320_firmware:3.0.5.0</product> <product>wnd930_firmware:2.0.4</product> <product>wndap210v2_firmware:3.0.5.0</product> <product>wndap350_firmware:3.0.5.0</product> <product>wndap360_firmware:3.0.5.0</product> </cve> <cve id="CVE-2016-4846" level="MEDIUM"> <product>phishwall_client:3.7.8.1</product> </cve> <cve id="CVE-2016-4847" level="MEDIUM"> <product>web_ui:0.8</product> </cve> <cve id="CVE-2016-4844" level="MEDIUM"> <product>mailwise:5.0.0</product> <product>mailwise:5.0.1</product> <product>mailwise:5.0.4</product> <product>mailwise:5.0.5</product> <product>mailwise:5.0.6</product> <product>mailwise:5.1.0</product> <product>mailwise:5.1.1</product> <product>mailwise:5.1.2</product> <product>mailwise:5.1.4</product> <product>mailwise:5.2.0</product> <product>mailwise:5.2.1</product> <product>mailwise:5.3.0</product> <product>mailwise:5.3.1</product> <product>mailwise:5.3.2</product> </cve> <cve id="CVE-2016-4845" level="MEDIUM"> <product>hvl-a2.0_firmware:2.03</product> <product>hvl-a3.0_firmware:2.03</product> <product>hvl-a4.0_firmware:2.03</product> <product>hvl-at1.0s_firmware:2.03</product> <product>hvl-at2.0_firmware:2.03</product> <product>hvl-at2.0a_firmware:2.03</product> <product>hvl-at3.0_firmware:2.03</product> <product>hvl-at3.0a_firmware:2.03</product> <product>hvl-at4.0_firmware:2.03</product> <product>hvl-at4.0a_firmware:2.03</product> </cve> <cve id="CVE-2016-4842" level="MEDIUM"> <product>mailwise:5.0.0</product> <product>mailwise:5.0.1</product> <product>mailwise:5.0.4</product> <product>mailwise:5.0.5</product> <product>mailwise:5.0.6</product> <product>mailwise:5.1.0</product> <product>mailwise:5.1.1</product> <product>mailwise:5.1.2</product> <product>mailwise:5.1.4</product> <product>mailwise:5.2.0</product> <product>mailwise:5.2.1</product> <product>mailwise:5.3.0</product> <product>mailwise:5.3.1</product> <product>mailwise:5.3.2</product> </cve> <cve id="CVE-2016-4075" level="MEDIUM"> <product>opera_browser:36.00</product> <product>opera_mini:13.00</product> </cve> <cve id="CVE-2016-4840" level="MEDIUM"> <product>coordinate_plus:1.0.2</product> <product>coordinate_plus:1.0.2</product> </cve> <cve id="CVE-2016-4841" level="MEDIUM"> <product>mailwise:5.0.0</product> <product>mailwise:5.0.1</product> <product>mailwise:5.0.4</product> <product>mailwise:5.0.5</product> <product>mailwise:5.0.6</product> <product>mailwise:5.1.0</product> <product>mailwise:5.1.1</product> <product>mailwise:5.1.2</product> <product>mailwise:5.1.4</product> <product>mailwise:5.2.0</product> <product>mailwise:5.2.1</product> <product>mailwise:5.3.0</product> <product>mailwise:5.3.1</product> <product>mailwise:5.3.2</product> </cve> <cve id="CVE-2016-4848" level="MEDIUM"> <product>clipbucket:2.8.1</product> </cve> <cve id="CVE-2016-4849" level="MEDIUM"> <product>geeklog:2.1.1</product> </cve> <cve id="CVE-2016-0701" level="HIGH"> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> </cve> <cve id="CVE-2016-0703" level="MEDIUM"> <product>openssl:0.9.8ze</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0a</product> <product>openssl:1.0.0b</product> <product>openssl:1.0.0c</product> <product>openssl:1.0.0d</product> <product>openssl:1.0.0e</product> <product>openssl:1.0.0f</product> <product>openssl:1.0.0g</product> <product>openssl:1.0.0h</product> <product>openssl:1.0.0i</product> <product>openssl:1.0.0j</product> <product>openssl:1.0.0k</product> <product>openssl:1.0.0l</product> <product>openssl:1.0.0m</product> <product>openssl:1.0.0n</product> <product>openssl:1.0.0o</product> <product>openssl:1.0.0p</product> <product>openssl:1.0.0q</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> </cve> <cve id="CVE-2016-0702" level="MEDIUM"> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.1m</product> <product>openssl:1.0.1n</product> <product>openssl:1.0.1o</product> <product>openssl:1.0.1p</product> <product>openssl:1.0.1q</product> <product>openssl:1.0.1r</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2a</product> <product>openssl:1.0.2b</product> <product>openssl:1.0.2c</product> <product>openssl:1.0.2d</product> <product>openssl:1.0.2e</product> <product>openssl:1.0.2f</product> </cve> <cve id="CVE-2016-0704" level="MEDIUM"> <product>openssl:0.9.8ze</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0</product> <product>openssl:1.0.0a</product> <product>openssl:1.0.0b</product> <product>openssl:1.0.0c</product> <product>openssl:1.0.0d</product> <product>openssl:1.0.0e</product> <product>openssl:1.0.0f</product> <product>openssl:1.0.0g</product> <product>openssl:1.0.0h</product> <product>openssl:1.0.0i</product> <product>openssl:1.0.0j</product> <product>openssl:1.0.0k</product> <product>openssl:1.0.0l</product> <product>openssl:1.0.0m</product> <product>openssl:1.0.0n</product> <product>openssl:1.0.0o</product> <product>openssl:1.0.0p</product> <product>openssl:1.0.0q</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1</product> <product>openssl:1.0.1a</product> <product>openssl:1.0.1b</product> <product>openssl:1.0.1c</product> <product>openssl:1.0.1d</product> <product>openssl:1.0.1e</product> <product>openssl:1.0.1f</product> <product>openssl:1.0.1g</product> <product>openssl:1.0.1h</product> <product>openssl:1.0.1i</product> <product>openssl:1.0.1j</product> <product>openssl:1.0.1k</product> <product>openssl:1.0.1l</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> <product>openssl:1.0.2</product> </cve> <cve id="CVE-2016-0707" level="LOW"> <product>ambari:2.1.1</product> </cve> <cve id="CVE-2016-0709" level="LOW"> <product>jetspeed:2.3.0</product> </cve> <cve id="CVE-2016-0708" level="MEDIUM"> <product>cf-release:166</product> <product>cf-release:167</product> <product>cf-release:168</product> <product>cf-release:169</product> <product>cf-release:170</product> <product>cf-release:171</product> <product>cf-release:172</product> <product>cf-release:173</product> <product>cf-release:174</product> <product>cf-release:175</product> <product>cf-release:176</product> <product>cf-release:177</product> <product>cf-release:178</product> <product>cf-release:179</product> <product>cf-release:180</product> <product>cf-release:181</product> <product>cf-release:182</product> <product>cf-release:183</product> <product>cf-release:184</product> <product>cf-release:185</product> <product>cf-release:186</product> <product>cf-release:187</product> <product>cf-release:188</product> <product>cf-release:189</product> <product>cf-release:190</product> <product>cf-release:191</product> <product>cf-release:192</product> <product>cf-release:193</product> <product>cf-release:194</product> <product>cf-release:195</product> <product>cf-release:196</product> <product>cf-release:197</product> <product>cf-release:198</product> <product>cf-release:199</product> <product>cf-release:200</product> <product>cf-release:201</product> <product>cf-release:202</product> <product>cf-release:203</product> <product>cf-release:204</product> <product>cf-release:205</product> <product>cf-release:206</product> <product>cf-release:207</product> <product>cf-release:208</product> <product>cf-release:209</product> <product>cf-release:210</product> <product>cf-release:211</product> <product>cf-release:212</product> <product>cf-release:213</product> <product>cf-release:214</product> <product>cf-release:215</product> <product>cf-release:216</product> <product>cf-release:217</product> <product>cf-release:218</product> <product>cf-release:219</product> <product>cf-release:220</product> <product>cf-release:221</product> <product>cf-release:222</product> <product>cf-release:223</product> <product>cf-release:224</product> <product>cf-release:225</product> <product>cf-release:226</product> <product>cf-release:227</product> </cve> <cve id="CVE-2016-9823" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9822" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9821" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9820" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9827" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9826" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9825" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9824" level="MEDIUM"> <product>libav:11.8</product> </cve> <cve id="CVE-2016-9829" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9828" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-10112" level="MEDIUM"> <product>woocommerce:2.6.8</product> </cve> <cve id="CVE-2016-10114" level="LOW"> <product>aweb_cart_watching_system_for_virtuemart:2.6.0</product> </cve> <cve id="CVE-2016-10115" level="LOW"> <product>arlo_base_station_firmware:1.7.5_6178</product> <product>arlo_q_camera_firmware:1.8.0_5551</product> <product>arlo_q_plus_camera_firmware:1.8.1_6094</product> </cve> <cve id="CVE-2016-10116" level="MEDIUM"> <product>arlo_base_station_firmware:1.7.5_6178</product> <product>arlo_q_camera_firmware:1.8.0_5551</product> <product>arlo_q_plus_camera_firmware:1.8.1_6094</product> </cve> <cve id="CVE-2016-10117" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10118" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10119" level="LOW"> <product>firejail:-</product> </cve> <cve id="CVE-2016-10378" level="LOW"> <product>e107:2.1.1</product> </cve> <cve id="CVE-2016-10379" level="LOW"> <product>virtuemart:3.0.14</product> </cve> <cve id="CVE-2016-9703" level="LOW"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> <product>security_identity_manager_virtual_appliance:7.0.1.1</product> <product>security_identity_manager_virtual_appliance:7.0.1.2</product> <product>security_identity_manager_virtual_appliance:7.0.1.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.4</product> </cve> <cve id="CVE-2016-10374" level="LOW"> <product>perltidy:20160302</product> </cve> <cve id="CVE-2016-10375" level="LOW"> <product>yodl:3.06.00</product> </cve> <cve id="CVE-2016-10376" level="MEDIUM"> <product>gajim:0.16.7</product> </cve> <cve id="CVE-2016-10377" level="LOW"> <product>openvswitch:2.5.0</product> </cve> <cve id="CVE-2016-10370" level="LOW"> <product>oxygenos</product> </cve> <cve id="CVE-2016-10371" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-10372" level="LOW"> <product>d1000_modem_firmware:-</product> </cve> <cve id="CVE-2016-5398" level="MEDIUM"> <product>jboss_bpm_suite:6.3.2</product> </cve> <cve id="CVE-2016-5827" level="LOW"> <product>libical:0.47</product> <product>libical:1.0</product> </cve> <cve id="CVE-2016-5390" level="HIGH"> <product>foreman:1.11.3</product> <product>foreman:1.12.0</product> </cve> <cve id="CVE-2016-5393" level="LOW"> <product>hadoop:2.6.0</product> <product>hadoop:2.6.1</product> <product>hadoop:2.6.2</product> <product>hadoop:2.6.3</product> <product>hadoop:2.6.4</product> <product>hadoop:2.7.0</product> <product>hadoop:2.7.1</product> <product>hadoop:2.7.2</product> </cve> <cve id="CVE-2016-5392" level="LOW"> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-5395" level="MEDIUM"> <product>ranger:0.5.0</product> <product>ranger:0.5.1</product> <product>ranger:0.5.2</product> <product>ranger:0.5.3</product> <product>ranger:0.6.0</product> </cve> <cve id="CVE-2016-5394" level="MEDIUM"> <product>sling:1.0.11</product> </cve> <cve id="CVE-2016-5397" level="LOW"> <product>thrift:0.9.3</product> </cve> <cve id="CVE-2016-5396" level="LOW"> <product>traffic_server:6.0.0</product> <product>traffic_server:6.1.0</product> <product>traffic_server:6.1.1</product> <product>traffic_server:6.2.0</product> </cve> <cve id="CVE-2016-9034" level="MEDIUM"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-9031" level="MEDIUM"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-9032" level="MEDIUM"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-9033" level="MEDIUM"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-5539" level="LOW"> <product>micros_xstore_payment:1.0</product> </cve> <cve id="CVE-2016-5538" level="LOW"> <product>vm_virtualbox:5.0.27</product> <product>vm_virtualbox:5.1.7</product> </cve> <cve id="CVE-2016-5534" level="LOW"> <product>siebel_user_interface_framework:16.1</product> </cve> <cve id="CVE-2016-5537" level="LOW"> <product>netbeans:8.1</product> </cve> <cve id="CVE-2016-5536" level="LOW"> <product>platform_security_for_java:12.1.3.0.0</product> <product>platform_security_for_java:12.2.1.0.0</product> <product>platform_security_for_java:12.2.1.1.0</product> </cve> <cve id="CVE-2016-5530" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-1000338" level="LOW"> <product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product> </cve> <cve id="CVE-2016-5532" level="LOW"> <product>shipping_execution:12.1.1</product> <product>shipping_execution:12.1.2</product> <product>shipping_execution:12.1.3</product> <product>shipping_execution:12.2.3</product> <product>shipping_execution:12.2.4</product> <product>shipping_execution:12.2.5</product> <product>shipping_execution:12.2.6</product> </cve> <cve id="CVE-2016-3295" level="HIGH"> <product>edge:-</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-8307" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-6059" level="LOW"> <product>infosphere_datastage:11.3</product> <product>infosphere_datastage:11.3.1</product> <product>infosphere_datastage:11.5</product> <product>infosphere_information_server:11.3</product> <product>infosphere_information_server:11.3.1</product> <product>infosphere_information_server:11.5</product> <product>infosphere_information_server_on_cloud:11.5</product> </cve> <cve id="CVE-2016-0954" level="LOW"> <product>digital_editions:4.5.0</product> </cve> <cve id="CVE-2016-0955" level="MEDIUM"> <product>experience_manager:6.1.0</product> </cve> <cve id="CVE-2016-0956" level="LOW"> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> <product>sling</product> </cve> <cve id="CVE-2016-0957" level="LOW"> <product>dispatcher:4.1.4</product> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> </cve> <cve id="CVE-2016-0950" level="LOW"> <product>connect:9.5.2</product> </cve> <cve id="CVE-2016-0951" level="LOW"> <product>bridge_cc:6.1</product> <product>photoshop_cc:16.1.1</product> </cve> <cve id="CVE-2016-0952" level="LOW"> <product>bridge_cc:6.1</product> <product>photoshop_cc:16.1.1</product> </cve> <cve id="CVE-2016-0953" level="LOW"> <product>bridge_cc:6.1</product> <product>photoshop_cc:16.1.1</product> </cve> <cve id="CVE-2016-0958" level="LOW"> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> </cve> <cve id="CVE-2016-0105" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-9868" level="LOW"> <product>scaleio:2.0.1.0</product> </cve> <cve id="CVE-2016-10627" level="MEDIUM"> <product>scala-bin:0.3.3</product> </cve> <cve id="CVE-2016-10624" level="MEDIUM"> <product>selenium-chromedriver:-</product> </cve> <cve id="CVE-2016-10583" level="MEDIUM"> <product>closure-util:1.26.0</product> </cve> <cve id="CVE-2016-10582" level="MEDIUM"> <product>closurecompiler:1.6.1</product> </cve> <cve id="CVE-2016-10581" level="MEDIUM"> <product>steroids:4.1.27</product> </cve> <cve id="CVE-2016-10580" level="MEDIUM"> <product>nodewebkit:0.11.2-1</product> </cve> <cve id="CVE-2016-10587" level="MEDIUM"> <product>wasdk:1.0.54</product> </cve> <cve id="CVE-2016-3378" level="MEDIUM"> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2016</product> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-10585" level="MEDIUM"> <product>libxl:0.3.0</product> </cve> <cve id="CVE-2016-10584" level="MEDIUM"> <product>dalekjs:0.0.11</product> </cve> <cve id="CVE-2016-10589" level="MEDIUM"> <product>selenium-binaries:0.10.0</product> </cve> <cve id="CVE-2016-10151" level="MEDIUM"> <product>hesiod:3.2.1</product> </cve> <cve id="CVE-2016-8709" level="MEDIUM"> <product>nitro_pro:10.5.9.9</product> </cve> <cve id="CVE-2016-10620" level="MEDIUM"> <product>atom-node-module-installer:0.9.0</product> </cve> <cve id="CVE-2016-8701" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8700" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8703" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8702" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8705" level="LOW"> <product>memcached:1.4.31</product> </cve> <cve id="CVE-2016-8704" level="LOW"> <product>memcached:1.4.31</product> </cve> <cve id="CVE-2016-8707" level="MEDIUM"> <product>imagemagick:7.0.3-1</product> </cve> <cve id="CVE-2016-8706" level="MEDIUM"> <product>memcached:1.4.31</product> </cve> <cve id="CVE-2016-0578" level="LOW"> <product>customer_relationship_management_technical_foundation:11.5.10.2</product> </cve> <cve id="CVE-2016-0579" level="MEDIUM"> <product>customer_relationship_management_technical_foundation:11.5.10.2</product> </cve> <cve id="CVE-2016-0570" level="LOW"> <product>human_capital_management_configuration_workbench:12.1.1</product> <product>human_capital_management_configuration_workbench:12.1.2</product> <product>human_capital_management_configuration_workbench:12.1.3</product> </cve> <cve id="CVE-2016-0571" level="LOW"> <product>balanced_scorecard:11.5.10.2</product> <product>balanced_scorecard:12.1</product> </cve> <cve id="CVE-2016-0576" level="LOW"> <product>application_object_library:11.5.10.2</product> </cve> <cve id="CVE-2016-0575" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-1157" level="MEDIUM"> <product>log-chat:1.0</product> </cve> <cve id="CVE-2016-4476" level="LOW"> <product>hostapd:0.6.7</product> <product>hostapd:0.7.0</product> <product>hostapd:0.7.1</product> <product>hostapd:0.7.2</product> <product>hostapd:0.7.3</product> <product>hostapd:1.0</product> <product>hostapd:1.1</product> <product>hostapd:2.0</product> <product>hostapd:2.1</product> <product>hostapd:2.2</product> <product>hostapd:2.3</product> <product>hostapd:2.4</product> <product>hostapd:2.5</product> </cve> <cve id="CVE-2016-4475" level="LOW"> <product>foreman:1.11.3</product> <product>foreman:1.12.0</product> </cve> <cve id="CVE-2016-4474" level="LOW"> <product>openstack:7.0</product> <product>openstack:8.0</product> </cve> <cve id="CVE-2016-1153" level="LOW"> <product>cybozu_office:9.9.0</product> <product>cybozu_office:10.3.0</product> </cve> <cve id="CVE-2016-4471" level="LOW"> <product>cloudforms:4.0</product> </cve> <cve id="CVE-2016-1158" level="HIGH"> <product>cg-wlbargmh_firmware:-</product> <product>cg-wlbargnl_firmware:-</product> </cve> <cve id="CVE-2016-3644" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-3646" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360:-</product> <product>norton_antivirus:-</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security:-</product> <product>norton_power_eraser:5.0</product> <product>norton_security:-</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup:-</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-0398" level="MEDIUM"> <product>cognos_analytics:11.0.0</product> </cve> <cve id="CVE-2016-0399" level="MEDIUM"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.1.1</product> <product>maximo_asset_management:7.1.1.1</product> <product>maximo_asset_management:7.1.1.2</product> <product>maximo_asset_management:7.1.1.3</product> <product>maximo_asset_management:7.1.1.5</product> <product>maximo_asset_management:7.1.1.6</product> <product>maximo_asset_management:7.1.1.7</product> <product>maximo_asset_management:7.1.1.8</product> <product>maximo_asset_management:7.1.1.9</product> <product>maximo_asset_management:7.1.1.10</product> <product>maximo_asset_management:7.1.1.11</product> <product>maximo_asset_management:7.1.1.12</product> <product>maximo_asset_management:7.1.1.13</product> <product>maximo_asset_management:7.1.2</product> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.5.0.10</product> <product>maximo_asset_management:7.6.0.4</product> <product>maximo_asset_management:7.6.0.5</product> </cve> <cve id="CVE-2016-0396" level="MEDIUM"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-0397" level="MEDIUM"> <product>bigfix_webreports:9.0</product> <product>bigfix_webreports:9.1</product> <product>bigfix_webreports:9.2</product> <product>bigfix_webreports:9.5</product> </cve> <cve id="CVE-2016-0394" level="LOW"> <product>integration_bus:9.0</product> <product>integration_bus:9.0.0.1</product> <product>integration_bus:9.0.0.2</product> <product>integration_bus:10.0</product> <product>websphere_message_broker:8.0</product> <product>websphere_message_broker:8.0.0.1</product> <product>websphere_message_broker:8.0.0.2</product> <product>websphere_message_broker:8.0.0.3</product> <product>websphere_message_broker:8.0.0.4</product> <product>websphere_message_broker:8.0.0.5</product> </cve> <cve id="CVE-2016-0392" level="LOW"> <product>elastic_storage_server:2.5.0</product> <product>elastic_storage_server:2.5.1</product> <product>elastic_storage_server:2.5.2</product> <product>elastic_storage_server:2.5.3</product> <product>elastic_storage_server:2.5.4</product> <product>elastic_storage_server:2.5.5</product> <product>elastic_storage_server:3.0.0</product> <product>elastic_storage_server:3.0.1</product> <product>elastic_storage_server:3.0.2</product> <product>elastic_storage_server:3.0.3</product> <product>elastic_storage_server:3.0.4</product> <product>elastic_storage_server:3.0.5</product> <product>elastic_storage_server:3.5.0</product> <product>elastic_storage_server:3.5.1</product> <product>elastic_storage_server:3.5.2</product> <product>elastic_storage_server:3.5.3</product> <product>elastic_storage_server:3.5.4</product> <product>elastic_storage_server:4.0.0</product> <product>elastic_storage_server:4.0.1</product> <product>elastic_storage_server:4.0.2</product> <product>general_parallel_file_system_storage_server:2.0.0</product> <product>general_parallel_file_system_storage_server:2.0.1</product> <product>general_parallel_file_system_storage_server:2.0.2</product> <product>general_parallel_file_system_storage_server:2.0.3</product> <product>general_parallel_file_system_storage_server:2.0.4</product> <product>general_parallel_file_system_storage_server:2.0.5</product> <product>general_parallel_file_system_storage_server:2.0.6</product> <product>general_parallel_file_system_storage_server:2.0.7</product> </cve> <cve id="CVE-2016-0393" level="LOW"> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.5.0.10</product> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> <product>maximo_asset_management:7.6.0.4</product> <product>maximo_asset_management:7.6.0.5</product> </cve> <cve id="CVE-2016-0390" level="MEDIUM"> <product>algo_one:4.9.1</product> <product>algo_one:5.0.0</product> <product>algo_one:5.1.0</product> </cve> <cve id="CVE-2016-0391" level="LOW"> <product>watson_developer_cloud:-</product> </cve> <cve id="CVE-2016-5706" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5704" level="MEDIUM"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> </cve> <cve id="CVE-2016-5705" level="MEDIUM"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5702" level="MEDIUM"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> </cve> <cve id="CVE-2016-5703" level="LOW"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5700" level="MEDIUM"> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> </cve> <cve id="CVE-2016-5701" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5709" level="MEDIUM"> <product>virtualization_manager:6.3.1</product> </cve> <cve id="CVE-2016-2169" level="LOW"> <product>cf-release:141</product> <product>cf-release:142</product> <product>cf-release:143</product> <product>cf-release:144</product> <product>cf-release:145</product> <product>cf-release:146</product> <product>cf-release:147</product> <product>cf-release:148</product> <product>cf-release:149</product> <product>cf-release:150</product> <product>cf-release:151</product> <product>cf-release:152</product> <product>cf-release:153</product> <product>cf-release:154</product> <product>cf-release:155</product> <product>cf-release:156</product> <product>cf-release:157</product> <product>cf-release:158</product> <product>cf-release:159</product> <product>cf-release:160</product> <product>cf-release:161</product> <product>cf-release:162</product> <product>cf-release:163</product> <product>cf-release:164</product> <product>cf-release:165</product> <product>cf-release:166</product> <product>cf-release:167</product> <product>cf-release:168</product> <product>cf-release:169</product> <product>cf-release:170</product> <product>cf-release:171</product> <product>cf-release:172</product> <product>cf-release:173</product> <product>cf-release:174</product> <product>cf-release:175</product> <product>cf-release:176</product> <product>cf-release:177</product> <product>cf-release:178</product> <product>cf-release:179</product> <product>cf-release:180</product> <product>cf-release:181</product> <product>cf-release:182</product> <product>cf-release:183</product> <product>cf-release:184</product> <product>cf-release:185</product> <product>cf-release:186</product> <product>cf-release:187</product> <product>cf-release:188</product> <product>cf-release:189</product> <product>cf-release:190</product> <product>cf-release:191</product> <product>cf-release:192</product> <product>cf-release:193</product> <product>cf-release:194</product> <product>cf-release:195</product> <product>cf-release:196</product> <product>cf-release:197</product> <product>cf-release:198</product> <product>cf-release:199</product> <product>cf-release:200</product> <product>cf-release:201</product> <product>cf-release:202</product> <product>cf-release:203</product> <product>cf-release:204</product> <product>cf-release:205</product> <product>cf-release:206</product> <product>cf-release:207</product> <product>cf-release:208</product> <product>cf-release:209</product> <product>cf-release:210</product> <product>cf-release:211</product> <product>cf-release:212</product> <product>cf-release:213</product> <product>cf-release:214</product> <product>cf-release:215</product> <product>cf-release:216</product> <product>cf-release:217</product> <product>cf-release:218</product> <product>cf-release:219</product> <product>cf-release:220</product> <product>cf-release:221</product> <product>cf-release:222</product> <product>cf-release:223</product> <product>cf-release:224</product> <product>cf-release:225</product> <product>cf-release:226</product> <product>cf-release:227</product> <product>cf-release:228</product> </cve> <cve id="CVE-2016-2168" level="LOW"> <product>subversion:1.8.15</product> <product>subversion:1.9.0</product> <product>subversion:1.9.1</product> <product>subversion:1.9.2</product> <product>subversion:1.9.3</product> </cve> <cve id="CVE-2016-2167" level="MEDIUM"> <product>subversion:1.8.15</product> <product>subversion:1.9.0</product> <product>subversion:1.9.1</product> <product>subversion:1.9.2</product> <product>subversion:1.9.3</product> </cve> <cve id="CVE-2016-2166" level="MEDIUM"> <product>qpid_proton:0.12.0</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2165" level="MEDIUM"> <product>cloud_foundry_cf_release:231</product> <product>cloud_foundry_elastic_runtime:1.5.18</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.16</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> </cve> <cve id="CVE-2016-2164" level="LOW"> <product>openmeetings:3.1.0</product> </cve> <cve id="CVE-2016-2163" level="MEDIUM"> <product>openmeetings:3.1.0</product> </cve> <cve id="CVE-2016-2162" level="MEDIUM"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.2_beta</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.12</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.20</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> </cve> <cve id="CVE-2016-2160" level="LOW"> <product>openshift:3.2</product> <product>openshift_origin:-</product> </cve> <cve id="CVE-2016-3464" level="LOW"> <product>flexcube_direct_banking:12.0.3</product> </cve> <cve id="CVE-2016-3467" level="LOW"> <product>application_express:5.0.3</product> </cve> <cve id="CVE-2016-3466" level="LOW"> <product>field_service:12.1.1</product> <product>field_service:12.1.2</product> <product>field_service:12.1.3</product> </cve> <cve id="CVE-2016-3460" level="LOW"> <product>peoplesoft_enterprise_human_capital_management_eperformance:9.2</product> </cve> <cve id="CVE-2016-6394" level="MEDIUM"> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.2.0.1</product> <product>firesight_system_software:5.2.0.2</product> <product>firesight_system_software:5.2.0.3</product> <product>firesight_system_software:5.2.0.4</product> <product>firesight_system_software:5.2.0.5</product> <product>firesight_system_software:5.2.0.6</product> <product>firesight_system_software:5.2.0.8</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.0.1</product> <product>firesight_system_software:5.3.0.2</product> <product>firesight_system_software:5.3.0.3</product> <product>firesight_system_software:5.3.0.4</product> <product>firesight_system_software:5.3.0.5</product> <product>firesight_system_software:5.3.0.6</product> <product>firesight_system_software:5.3.0.7</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.3.1.1</product> <product>firesight_system_software:5.3.1.2</product> <product>firesight_system_software:5.3.1.3</product> <product>firesight_system_software:5.3.1.4</product> <product>firesight_system_software:5.3.1.5</product> <product>firesight_system_software:5.3.1.7</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> <product>firesight_system_software:5.4.0.4</product> <product>firesight_system_software:5.4.0.5</product> <product>firesight_system_software:5.4.0.6</product> <product>firesight_system_software:5.4.1</product> <product>firesight_system_software:5.4.1.2</product> <product>firesight_system_software:5.4.1.3</product> <product>firesight_system_software:5.4.1.4</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> <product>firesight_system_software:6.1.0</product> </cve> <cve id="CVE-2016-6395" level="MEDIUM"> <product>firesight_system_software:5.1.0</product> <product>firesight_system_software:5.1.0.1</product> <product>firesight_system_software:5.1.0.2</product> <product>firesight_system_software:5.1.0.3</product> <product>firesight_system_software:5.1.1</product> <product>firesight_system_software:5.1.1.1</product> <product>firesight_system_software:5.1.1.2</product> <product>firesight_system_software:5.1.1.3</product> <product>firesight_system_software:5.1.1.4</product> <product>firesight_system_software:5.1.1.5</product> <product>firesight_system_software:5.1.1.6</product> <product>firesight_system_software:5.1.1.8</product> <product>firesight_system_software:5.1.1.9</product> <product>firesight_system_software:5.1.1.10</product> <product>firesight_system_software:5.1.1.11</product> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.2.0.1</product> <product>firesight_system_software:5.2.0.2</product> <product>firesight_system_software:5.2.0.3</product> <product>firesight_system_software:5.2.0.4</product> <product>firesight_system_software:5.2.0.5</product> <product>firesight_system_software:5.2.0.6</product> <product>firesight_system_software:5.2.0.8</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.0.1</product> <product>firesight_system_software:5.3.0.2</product> <product>firesight_system_software:5.3.0.3</product> <product>firesight_system_software:5.3.0.4</product> <product>firesight_system_software:5.3.0.5</product> <product>firesight_system_software:5.3.0.6</product> <product>firesight_system_software:5.3.0.7</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.3.1.1</product> <product>firesight_system_software:5.3.1.2</product> <product>firesight_system_software:5.3.1.3</product> <product>firesight_system_software:5.3.1.4</product> <product>firesight_system_software:5.3.1.5</product> <product>firesight_system_software:5.3.1.7</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> <product>firesight_system_software:5.4.0.4</product> <product>firesight_system_software:5.4.0.5</product> <product>firesight_system_software:5.4.0.6</product> <product>firesight_system_software:5.4.1</product> <product>firesight_system_software:5.4.1.2</product> <product>firesight_system_software:5.4.1.3</product> <product>firesight_system_software:5.4.1.4</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-6396" level="LOW"> <product>firesight_system_software:5.1.0</product> <product>firesight_system_software:5.1.0.1</product> <product>firesight_system_software:5.1.0.2</product> <product>firesight_system_software:5.1.0.3</product> <product>firesight_system_software:5.1.1</product> <product>firesight_system_software:5.1.1.1</product> <product>firesight_system_software:5.1.1.2</product> <product>firesight_system_software:5.1.1.3</product> <product>firesight_system_software:5.1.1.4</product> <product>firesight_system_software:5.1.1.5</product> <product>firesight_system_software:5.1.1.6</product> <product>firesight_system_software:5.1.1.8</product> <product>firesight_system_software:5.1.1.9</product> <product>firesight_system_software:5.1.1.10</product> <product>firesight_system_software:5.1.1.11</product> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.2.0.1</product> <product>firesight_system_software:5.2.0.2</product> <product>firesight_system_software:5.2.0.3</product> <product>firesight_system_software:5.2.0.4</product> <product>firesight_system_software:5.2.0.5</product> <product>firesight_system_software:5.2.0.6</product> <product>firesight_system_software:5.2.0.8</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.0.1</product> <product>firesight_system_software:5.3.0.2</product> <product>firesight_system_software:5.3.0.3</product> <product>firesight_system_software:5.3.0.4</product> <product>firesight_system_software:5.3.0.5</product> <product>firesight_system_software:5.3.0.6</product> <product>firesight_system_software:5.3.0.7</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.3.1.1</product> <product>firesight_system_software:5.3.1.2</product> <product>firesight_system_software:5.3.1.3</product> <product>firesight_system_software:5.3.1.4</product> <product>firesight_system_software:5.3.1.5</product> <product>firesight_system_software:5.3.1.7</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> <product>firesight_system_software:5.4.0.4</product> <product>firesight_system_software:5.4.0.5</product> <product>firesight_system_software:5.4.0.6</product> <product>firesight_system_software:5.4.1</product> <product>firesight_system_software:5.4.1.2</product> <product>firesight_system_software:5.4.1.3</product> <product>firesight_system_software:5.4.1.4</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-6425" level="MEDIUM"> <product>unified_contact_center_express:10.0%281%29</product> <product>unified_contact_center_express:10.5%281%29</product> <product>unified_contact_center_express:10.6%281%29</product> <product>unified_contact_center_express:11.0%281%29</product> <product>unified_intelligence_center:8.5.4</product> <product>unified_intelligence_center:9.0%282%29</product> <product>unified_intelligence_center:9.1%281%29</product> </cve> <cve id="CVE-2016-6934" level="MEDIUM"> <product>experience_manager_forms:6.2</product> <product>livecycle:10.0.4</product> <product>livecycle:11.0.1</product> </cve> <cve id="CVE-2016-6935" level="LOW"> <product>creative_cloud:3.7.0.272</product> </cve> <cve id="CVE-2016-6936" level="LOW"> <product>air_sdk_%26_compiler:22.0.0.153</product> </cve> <cve id="CVE-2016-3417" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-6938" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-6939" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6399" level="LOW"> <product>ace_application_control_engine_module_a1:7a</product> <product>ace_application_control_engine_module_a1:7b</product> <product>ace_application_control_engine_module_a1:8.0</product> <product>ace_application_control_engine_module_a1:8.0a</product> <product>ace_application_control_engine_module_a3:1.0</product> <product>ace_application_control_engine_module_a3:2.0</product> <product>ace_application_control_engine_module_a3:2.2</product> <product>ace_application_control_engine_module_a3:2.3</product> <product>ace_application_control_engine_module_a3:2.4</product> <product>ace_application_control_engine_module_a3:2.5</product> <product>ace_application_control_engine_module_a3:2.6</product> <product>ace_application_control_engine_module_a3:2.7</product> <product>ace_application_control_engine_module_a4:1.0</product> <product>ace_application_control_engine_module_a4:1.1</product> <product>ace_application_control_engine_module_a4:2.0</product> <product>ace_application_control_engine_module_a4:2.1a</product> <product>ace_application_control_engine_module_a4:2.2</product> <product>ace_application_control_engine_module_a4:2.3</product> <product>ace_application_control_engine_module_a5:1.0</product> <product>ace_application_control_engine_module_a5:1.1</product> <product>ace_application_control_engine_module_a5:1.2</product> <product>ace_application_control_engine_module_a5:2.0</product> <product>ace_application_control_engine_module_a5:2.1</product> <product>ace_application_control_engine_module_a5:2.1e</product> <product>ace_application_control_engine_module_a5:3.0</product> <product>ace_application_control_engine_module_a5:3.1a</product> <product>ace_application_control_engine_module_a5:3.1b</product> <product>ace_application_control_engine_module_a5:3.2</product> <product>ace_application_control_engine_module_a5:3.3</product> <product>ace_4700_series_application_control_engine_appliance:a5%281.0%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%281.1%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%281.2%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%282.0%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%282.1%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%282.1e%29</product> <product>ace_4700_series_application_control_engine_appliance:a5%283.0%29</product> <product>ace_4700_series_application_control_engine_appliance:a5_base</product> <product>ace_4700_series_application_control_engine_appliance_a1:7</product> <product>ace_4700_series_application_control_engine_appliance_a1:7a</product> <product>ace_4700_series_application_control_engine_appliance_a1:7b</product> <product>ace_4700_series_application_control_engine_appliance_a1:8.0</product> <product>ace_4700_series_application_control_engine_appliance_a1:8.0a</product> <product>ace_4700_series_application_control_engine_appliance_a3:1.0</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.0</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.2</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.3</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.4</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.5</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.6</product> <product>ace_4700_series_application_control_engine_appliance_a3:2.7</product> <product>ace_4700_series_application_control_engine_appliance_a4:1.0</product> <product>ace_4700_series_application_control_engine_appliance_a4:1.1</product> <product>ace_4700_series_application_control_engine_appliance_a4:2.0</product> <product>ace_4700_series_application_control_engine_appliance_a4:2.1a</product> <product>ace_4700_series_application_control_engine_appliance_a4:2.2</product> <product>ace_4700_series_application_control_engine_appliance_a4:2.3</product> <product>ace_4700_series_application_control_engine_appliance_a5:3.1a</product> <product>ace_4700_series_application_control_engine_appliance_a5:3.1b</product> <product>ace_4700_series_application_control_engine_appliance_a5:3.2</product> <product>ace_4700_series_application_control_engine_appliance_a5:3.3</product> </cve> <cve id="CVE-2016-6429" level="MEDIUM"> <product>ip_interoperability_and_collaboration_system:4.10%281%29</product> </cve> <cve id="CVE-2016-0266" level="MEDIUM"> <product>aix:5.3</product> <product>aix:6.1</product> <product>aix:7.1</product> <product>aix:7.2</product> <product>vios:2.2.0.10</product> <product>vios:2.2.0.11</product> <product>vios:2.2.0.12</product> <product>vios:2.2.0.13</product> <product>vios:2.2.1.0</product> <product>vios:2.2.1.1</product> <product>vios:2.2.1.3</product> <product>vios:2.2.1.4</product> <product>vios:2.2.1.5</product> <product>vios:2.2.1.6</product> <product>vios:2.2.1.7</product> <product>vios:2.2.1.8</product> <product>vios:2.2.1.9</product> <product>vios:2.2.2.0</product> <product>vios:2.2.2.1</product> <product>vios:2.2.2.2</product> <product>vios:2.2.2.3</product> <product>vios:2.2.2.4</product> <product>vios:2.2.2.5</product> <product>vios:2.2.3.0</product> <product>vios:2.2.3.1</product> <product>vios:2.2.3.2</product> <product>vios:2.2.3.3</product> <product>vios:2.2.3.4</product> <product>vios:2.2.3.50</product> <product>vios:2.2.3.51</product> <product>vios:2.2.3.52</product> <product>vios:2.2.3.60</product> <product>vios:2.2.3.70</product> <product>vios:2.2.4.0</product> <product>vios:2.2.4.10</product> <product>vios:2.2.4.21</product> <product>vios:2.2.4.22</product> </cve> <cve id="CVE-2016-6949" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6948" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6642" level="MEDIUM"> <product>vipr_srm:3.7.1</product> </cve> <cve id="CVE-2016-6643" level="MEDIUM"> <product>vipr_srm:3.7.1</product> </cve> <cve id="CVE-2016-6641" level="MEDIUM"> <product>vipr_srm:3.7.1</product> </cve> <cve id="CVE-2016-6646" level="LOW"> <product>solutions_enabler:8.0</product> <product>solutions_enabler:8.0.3</product> <product>solutions_enabler:8.1</product> <product>solutions_enabler:8.1.2</product> <product>solutions_enabler:8.3</product> <product>unisphere:8.0</product> <product>unisphere:8.0.3</product> <product>unisphere:8.1</product> <product>unisphere:8.1.2</product> <product>unisphere:8.2</product> </cve> <cve id="CVE-2016-6647" level="MEDIUM"> <product>vipr_srm:4.0</product> </cve> <cve id="CVE-2016-6644" level="LOW"> <product>documentum_d2:4.5</product> <product>documentum_d2:4.6</product> </cve> <cve id="CVE-2016-6645" level="LOW"> <product>solutions_enabler:8.0</product> <product>solutions_enabler:8.0.3</product> <product>solutions_enabler:8.1</product> <product>solutions_enabler:8.1.2</product> <product>solutions_enabler:8.2</product> <product>unisphere:8.0</product> <product>unisphere:8.0.3</product> <product>unisphere:8.1</product> <product>unisphere:8.1.2</product> <product>unisphere:8.2</product> </cve> <cve id="CVE-2016-6648" level="LOW"> <product>recoverpoint:4.4.1.0</product> <product>recoverpoint_for_virtual_machines:4.0</product> </cve> <cve id="CVE-2016-6649" level="LOW"> <product>recoverpoint:4.4.1.0</product> <product>recoverpoint_for_virtual_machines:4.0</product> </cve> <cve id="CVE-2016-3421" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0265" level="MEDIUM"> <product>campaign:8.6</product> <product>campaign:9.1</product> <product>campaign:9.1.1</product> <product>campaign:9.1.2</product> </cve> <cve id="CVE-2016-2402" level="MEDIUM"> <product>okhttp:2.7.3</product> <product>okhttp3:3.0.0</product> <product>okhttp3:3.0.0</product> <product>okhttp3:3.0.1</product> <product>okhttp3:3.1.0</product> <product>okhttp3:3.1.1</product> </cve> <cve id="CVE-2016-0491" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0490" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0492" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0147" level="MEDIUM"> <product>xml_core_services:3.0</product> </cve> <cve id="CVE-2016-0497" level="MEDIUM"> <product>agile_engineering_data_management:6.1.2.2</product> <product>agile_engineering_data_management:6.1.3.0</product> <product>agile_engineering_data_management:6.2.0.0</product> </cve> <cve id="CVE-2016-0496" level="MEDIUM"> <product>micros_cwdirect:12.5</product> <product>micros_cwdirect:13.0</product> <product>micros_cwdirect:14.0</product> <product>micros_cwdirect:15.0</product> <product>micros_cwdirect:16.0</product> <product>micros_cwdirect:17.0</product> <product>micros_cwdirect:18.0</product> </cve> <cve id="CVE-2016-0498" level="MEDIUM"> <product>agile_engineering_data_management:6.1.2.2</product> <product>agile_engineering_data_management:6.1.3.0</product> <product>agile_engineering_data_management:6.2.0.0</product> </cve> <cve id="CVE-2016-7011" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-4864" level="LOW"> <product>h2o:2.0.3</product> <product>h2o:2.1.0</product> </cve> <cve id="CVE-2016-4860" level="LOW"> <product>stardom_fcn%2ffcj:r1.01</product> <product>stardom_fcn%2ffcj:r2.01</product> <product>stardom_fcn%2ffcj:r3.01</product> <product>stardom_fcn%2ffcj:r4.01</product> </cve> <cve id="CVE-2016-4861" level="LOW"> <product>zend_framework:1.12.19</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-4862" level="LOW"> <product>cs-cart:4.3.9</product> <product>cs-cart:4.3.9</product> </cve> <cve id="CVE-2016-4863" level="LOW"> <product>flashair:1.00.03</product> <product>flashair:1.00.04</product> <product>flashair:1.00.06</product> <product>flashair:1.02</product> <product>flashair:2.00.03</product> <product>flashair:3.00.01</product> <product>flashair:3.0.2</product> </cve> <cve id="CVE-2016-5975" level="MEDIUM"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-1918" level="MEDIUM"> <product>enterprise_server:12.4</product> </cve> <cve id="CVE-2016-5974" level="MEDIUM"> <product>security_privileged_identity_manager_virtual_appliance:2.0.2</product> </cve> <cve id="CVE-2016-7014" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7015" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-5976" level="HIGH"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-7119" level="MEDIUM"> <product>dotnetnuke:08.00.04</product> </cve> <cve id="CVE-2016-7016" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-0729" level="LOW"> <product>xerces-c%5c%2b%5c%2b:3.1.2</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-7115" level="LOW"> <product>mac-telnet:0.4.3</product> </cve> <cve id="CVE-2016-0726" level="LOW"> <product>nagios:-</product> </cve> <cve id="CVE-2016-0725" level="MEDIUM"> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-0724" level="LOW"> <product>moodle:2.6.11</product> <product>moodle:2.7</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-7110" level="LOW"> <product>uma:v200r001c00spc100</product> </cve> <cve id="CVE-2016-7113" level="LOW"> <product>en100_ethernet_module_firmware:4.28</product> </cve> <cve id="CVE-2016-7112" level="LOW"> <product>en100_ethernet_module_firmware:4.28</product> </cve> <cve id="CVE-2016-9849" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-7018" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7019" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-9841" level="LOW"> <product>zlib:1.2.8</product> <product>leap:42.1</product> <product>leap:42.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9840" level="MEDIUM"> <product>zlib:1.2.8</product> <product>leap:42.1</product> <product>leap:42.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9843" level="LOW"> <product>zlib:1.2.8</product> <product>leap:42.1</product> <product>leap:42.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5972" level="MEDIUM"> <product>security_privileged_identity_manager_virtual_appliance:2.0.2</product> </cve> <cve id="CVE-2016-9845" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-6543" level="MEDIUM"> <product>itrack_easy:-</product> </cve> <cve id="CVE-2016-9847" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9846" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-10178" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10179" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10172" level="MEDIUM"> <product>wavpack:5.0.0</product> </cve> <cve id="CVE-2016-10173" level="LOW"> <product>archive-tar-minitar:0.5.2</product> <product>minitar:0.5.4</product> </cve> <cve id="CVE-2016-10170" level="MEDIUM"> <product>wavpack:5.0.0</product> </cve> <cve id="CVE-2016-10171" level="MEDIUM"> <product>wavpack:5.0.0</product> </cve> <cve id="CVE-2016-10176" level="LOW"> <product>wnr2000v5_firmware:1.0.0.34</product> </cve> <cve id="CVE-2016-10177" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10174" level="LOW"> <product>wnr2000v5_firmware:1.0.0.34</product> </cve> <cve id="CVE-2016-10175" level="LOW"> <product>wnr2000v5_firmware:1.0.0.34</product> </cve> <cve id="CVE-2016-6547" level="LOW"> <product>nut_mobile:-</product> </cve> <cve id="CVE-2016-6546" level="LOW"> <product>itrackeasy:-</product> </cve> <cve id="CVE-2016-0268" level="LOW"> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-0269" level="MEDIUM"> <product>bigfix_platform:9.0.5</product> <product>bigfix_platform:9.0.6</product> <product>bigfix_platform:9.0.7</product> <product>bigfix_platform:9.0.8</product> <product>bigfix_platform:9.1.3</product> <product>bigfix_platform:9.1.4</product> <product>bigfix_platform:9.1.5</product> <product>bigfix_platform:9.1.6</product> <product>bigfix_platform:9.1.7</product> <product>bigfix_platform:9.2.0</product> <product>bigfix_platform:9.2.1</product> <product>bigfix_platform:9.2.2</product> <product>bigfix_platform:9.2.3</product> <product>bigfix_platform:9.2.4</product> <product>bigfix_platform:9.2.5</product> <product>bigfix_platform:9.2.6</product> </cve> <cve id="CVE-2016-10396" level="LOW"> <product>ipsec-tools:0.8.2</product> </cve> <cve id="CVE-2016-4393" level="MEDIUM"> <product>system_management_homepage:7.5.5.0</product> </cve> <cve id="CVE-2016-4390" level="MEDIUM"> <product>keyview:10.18.0.0</product> <product>keyview:10.19.0.0</product> <product>keyview:10.20.0.0</product> <product>keyview:10.21.0.0</product> <product>keyview:10.22.0.0</product> <product>keyview:10.23.0.0</product> <product>keyview:10.24.0.0</product> </cve> <cve id="CVE-2016-10395" level="LOW"> <product>flexnet_publisher:11.14.1</product> </cve> <cve id="CVE-2016-4396" level="LOW"> <product>system_management_homepage:7.5.5.0</product> </cve> <cve id="CVE-2016-4394" level="MEDIUM"> <product>system_management_homepage:7.5.5.0</product> </cve> <cve id="CVE-2016-4395" level="LOW"> <product>system_management_homepage:7.5.5.0</product> </cve> <cve id="CVE-2016-10399" level="LOW"> <product>sendio:8.2.0</product> </cve> <cve id="CVE-2016-0262" level="MEDIUM"> <product>maximo_asset_management:7.1.1</product> <product>maximo_asset_management:7.1.1.1</product> <product>maximo_asset_management:7.1.1.2</product> <product>maximo_asset_management:7.1.1.3</product> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> </cve> <cve id="CVE-2016-0263" level="LOW"> <product>general_parallel_file_system_storage_server:3.5.0.1</product> <product>general_parallel_file_system_storage_server:3.5.0.2</product> <product>general_parallel_file_system_storage_server:3.5.0.3</product> <product>general_parallel_file_system_storage_server:3.5.0.4</product> <product>general_parallel_file_system_storage_server:3.5.0.5</product> <product>general_parallel_file_system_storage_server:3.5.0.6</product> <product>general_parallel_file_system_storage_server:3.5.0.7</product> <product>general_parallel_file_system_storage_server:3.5.0.8</product> <product>general_parallel_file_system_storage_server:3.5.0.9</product> <product>general_parallel_file_system_storage_server:3.5.0.10</product> <product>general_parallel_file_system_storage_server:3.5.0.11</product> <product>general_parallel_file_system_storage_server:3.5.0.12</product> <product>general_parallel_file_system_storage_server:3.5.0.13</product> <product>general_parallel_file_system_storage_server:3.5.0.14</product> <product>general_parallel_file_system_storage_server:3.5.0.15</product> <product>general_parallel_file_system_storage_server:3.5.0.16</product> <product>general_parallel_file_system_storage_server:3.5.0.17</product> <product>general_parallel_file_system_storage_server:3.5.0.18</product> <product>general_parallel_file_system_storage_server:3.5.0.19</product> <product>general_parallel_file_system_storage_server:3.5.0.20</product> <product>general_parallel_file_system_storage_server:3.5.0.21</product> <product>general_parallel_file_system_storage_server:3.5.0.22</product> <product>general_parallel_file_system_storage_server:3.5.0.23</product> <product>general_parallel_file_system_storage_server:3.5.0.24</product> <product>general_parallel_file_system_storage_server:3.5.0.25</product> <product>general_parallel_file_system_storage_server:3.5.0.26</product> <product>general_parallel_file_system_storage_server:3.5.0.27</product> <product>general_parallel_file_system_storage_server:3.5.0.28</product> <product>general_parallel_file_system_storage_server:3.5.0.29</product> <product>spectrum_scale:4.1.1.1</product> <product>spectrum_scale:4.1.1.2</product> <product>spectrum_scale:4.1.1.3</product> <product>spectrum_scale:4.1.1.4</product> <product>spectrum_scale:4.2.0.0</product> <product>spectrum_scale:4.2.0.1</product> </cve> <cve id="CVE-2016-0260" level="LOW"> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> </cve> <cve id="CVE-2016-9269" level="LOW"> <product>interscan_web_security_virtual_appliance:6.5</product> </cve> <cve id="CVE-2016-9268" level="LOW"> <product>dotclear:2.10.4</product> </cve> <cve id="CVE-2016-9265" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9264" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9266" level="MEDIUM"> <product>libming:0.4.7</product> </cve> <cve id="CVE-2016-9261" level="MEDIUM"> <product>log_correlation_engine:4.8</product> </cve> <cve id="CVE-2016-9260" level="MEDIUM"> <product>nessus:6.8.1</product> </cve> <cve id="CVE-2016-9262" level="MEDIUM"> <product>jasper:1.900.21</product> </cve> <cve id="CVE-2016-1458" level="LOW"> <product>firepower_management_center:4.10.3</product> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.4.0</product> </cve> <cve id="CVE-2016-1457" level="LOW"> <product>firepower_management_center:4.10.3.9</product> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.3.0.4</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.4.0</product> </cve> <cve id="CVE-2016-1454" level="MEDIUM"> <product>nx-os:4.0%280%29n1%281a%29</product> <product>nx-os:4.0%280%29n1%282%29</product> <product>nx-os:4.0%280%29n1%282a%29</product> <product>nx-os:4.0%281a%29n1%281%29</product> <product>nx-os:4.0%281a%29n1%281a%29</product> <product>nx-os:4.0%281a%29n2%281%29</product> <product>nx-os:4.0%281a%29n2%281a%29</product> <product>nx-os:4.0%284%29sv1%281%29</product> <product>nx-os:4.0%284%29sv1%282%29</product> <product>nx-os:4.0%284%29sv1%283%29</product> <product>nx-os:4.0%284%29sv1%283a%29</product> <product>nx-os:4.0%284%29sv1%283b%29</product> <product>nx-os:4.0%284%29sv1%283c%29</product> <product>nx-os:4.0%284%29sv1%283d%29</product> <product>nx-os:4.1%283%29n1%281%29</product> <product>nx-os:4.1%283%29n1%281a%29</product> <product>nx-os:4.1%283%29n2%281%29</product> <product>nx-os:4.1%283%29n2%281a%29</product> <product>nx-os:4.1.%282%29</product> <product>nx-os:4.1.%283%29</product> <product>nx-os:4.1.%284%29</product> <product>nx-os:4.1.%285%29</product> <product>nx-os:4.2%281%29n1%281%29</product> <product>nx-os:4.2%281%29n2%281%29</product> <product>nx-os:4.2%281%29n2%281a%29</product> <product>nx-os:4.2%281%29sv1%284%29</product> <product>nx-os:4.2%281%29sv1%284a%29</product> <product>nx-os:4.2%281%29sv1%284b%29</product> <product>nx-os:4.2%281%29sv1%285.1%29</product> <product>nx-os:4.2%281%29sv1%285.1a%29</product> <product>nx-os:4.2%281%29sv1%285.2%29</product> <product>nx-os:4.2%281%29sv1%285.2b%29</product> <product>nx-os:4.2%281%29sv2%281.1%29</product> <product>nx-os:4.2%281%29sv2%281.1a%29</product> <product>nx-os:4.2%281%29sv2%282.1%29</product> <product>nx-os:4.2%281%29sv2%282.1a%29</product> <product>nx-os:4.2%283%29</product> <product>nx-os:4.2%284%29</product> <product>nx-os:4.2%286%29</product> <product>nx-os:4.2%288%29</product> <product>nx-os:4.2.%282a%29</product> <product>nx-os:5.0%282%29n1%281%29</product> <product>nx-os:5.0%282%29n2%281%29</product> <product>nx-os:5.0%282%29n2%281a%29</product> <product>nx-os:5.0%282a%29</product> <product>nx-os:5.0%283%29</product> <product>nx-os:5.0%283%29n1%281c%29</product> <product>nx-os:5.0%283%29n2%281%29</product> <product>nx-os:5.0%283%29n2%282%29</product> <product>nx-os:5.0%283%29n2%282a%29</product> <product>nx-os:5.0%283%29n2%282b%29</product> <product>nx-os:5.0%283%29u1%281%29</product> <product>nx-os:5.0%283%29u1%281a%29</product> <product>nx-os:5.0%283%29u1%281b%29</product> <product>nx-os:5.0%283%29u1%281d%29</product> <product>nx-os:5.0%283%29u1%282%29</product> <product>nx-os:5.0%283%29u1%282a%29</product> <product>nx-os:5.0%283%29u2%281%29</product> <product>nx-os:5.0%283%29u2%282%29</product> <product>nx-os:5.0%283%29u2%282a%29</product> <product>nx-os:5.0%283%29u2%282b%29</product> <product>nx-os:5.0%283%29u2%282c%29</product> <product>nx-os:5.0%283%29u2%282d%29</product> <product>nx-os:5.0%283%29u3%281%29</product> <product>nx-os:5.0%283%29u3%282%29</product> <product>nx-os:5.0%283%29u3%282a%29</product> <product>nx-os:5.0%283%29u3%282b%29</product> <product>nx-os:5.0%283%29u4%281%29</product> <product>nx-os:5.0%283%29u5%281%29</product> <product>nx-os:5.0%283%29u5%281a%29</product> <product>nx-os:5.0%283%29u5%281b%29</product> <product>nx-os:5.0%283%29u5%281c%29</product> <product>nx-os:5.0%283%29u5%281d%29</product> <product>nx-os:5.0%283%29u5%281e%29</product> <product>nx-os:5.0%283%29u5%281f%29</product> <product>nx-os:5.0%283%29u5%281g%29</product> <product>nx-os:5.0%283%29u5%281h%29</product> <product>nx-os:5.0%285%29</product> <product>nx-os:5.1%281%29</product> <product>nx-os:5.1%281a%29</product> <product>nx-os:5.1%283%29</product> <product>nx-os:5.1%283%29n1%281%29</product> <product>nx-os:5.1%283%29n1%281a%29</product> <product>nx-os:5.1%283%29n2%281%29</product> <product>nx-os:5.1%283%29n2%281a%29</product> <product>nx-os:5.1%283%29n2%281b%29</product> <product>nx-os:5.1%283%29n2%281c%29</product> <product>nx-os:5.1%284%29</product> <product>nx-os:5.1%285%29</product> <product>nx-os:5.1%286%29</product> <product>nx-os:5.2%281%29</product> <product>nx-os:5.2%281%29n1%281%29</product> <product>nx-os:5.2%281%29n1%281a%29</product> <product>nx-os:5.2%281%29n1%282%29</product> <product>nx-os:5.2%281%29n1%282a%29</product> <product>nx-os:5.2%281%29n1%283%29</product> <product>nx-os:5.2%281%29n1%284%29</product> <product>nx-os:5.2%281%29n1%285%29</product> <product>nx-os:5.2%281%29n1%286%29</product> <product>nx-os:5.2%281%29n1%287%29</product> <product>nx-os:5.2%281%29n1%288%29</product> <product>nx-os:5.2%281%29n1%288a%29</product> <product>nx-os:5.2%281%29sv3%281.1%29</product> <product>nx-os:5.2%281%29sv3%281.3%29</product> <product>nx-os:5.2%281%29sv3%281.4%29</product> <product>nx-os:5.2%281%29sv3%281.5a%29</product> <product>nx-os:5.2%281%29sv3%281.5b%29</product> <product>nx-os:5.2%281%29sv3%281.6%29</product> <product>nx-os:5.2%281%29sv3%281.10%29</product> <product>nx-os:5.2%283a%29</product> <product>nx-os:5.2%284%29</product> <product>nx-os:5.2%285%29</product> <product>nx-os:5.2%287%29</product> <product>nx-os:5.2%289%29</product> <product>nx-os:5.2%289%29n1%281%29</product> <product>nx-os:6.0%281%29</product> <product>nx-os:6.0%282%29</product> <product>nx-os:6.0%282%29a6%281%29</product> <product>nx-os:6.0%282%29a6%282%29</product> <product>nx-os:6.0%282%29a6%283%29</product> <product>nx-os:6.0%282%29a6%284%29</product> <product>nx-os:6.0%282%29a6%285%29</product> <product>nx-os:6.0%282%29a6%286%29</product> <product>nx-os:6.0%282%29a6%287%29</product> <product>nx-os:6.0%282%29a6%288%29</product> <product>nx-os:6.0%282%29a7%281%29</product> <product>nx-os:6.0%282%29a7%282%29</product> <product>nx-os:6.0%282%29a7%282a%29</product> <product>nx-os:6.0%282%29a8%282%29</product> <product>nx-os:6.0%282%29n1%281%29</product> <product>nx-os:6.0%282%29n1%282%29</product> <product>nx-os:6.0%282%29n1%282a%29</product> <product>nx-os:6.0%282%29n2%281%29</product> <product>nx-os:6.0%282%29n2%281b%29</product> <product>nx-os:6.0%282%29n2%282%29</product> <product>nx-os:6.0%282%29n2%283%29</product> <product>nx-os:6.0%282%29n2%284%29</product> <product>nx-os:6.0%282%29n2%285%29</product> <product>nx-os:6.0%282%29n2%285a%29</product> <product>nx-os:6.0%282%29n2%286%29</product> <product>nx-os:6.0%282%29n2%287%29</product> <product>nx-os:6.0%282%29u1%281a%29</product> <product>nx-os:6.0%282%29u1%282%29</product> <product>nx-os:6.0%282%29u1%283%29</product> <product>nx-os:6.0%282%29u1%284%29</product> <product>nx-os:6.0%282%29u2%281%29</product> <product>nx-os:6.0%282%29u2%282%29</product> <product>nx-os:6.0%282%29u2%283%29</product> <product>nx-os:6.0%282%29u2%284%29</product> <product>nx-os:6.0%282%29u2%285%29</product> <product>nx-os:6.0%282%29u2%286%29</product> <product>nx-os:6.0%282%29u3%281%29</product> <product>nx-os:6.0%282%29u3%282%29</product> <product>nx-os:6.0%282%29u3%283%29</product> <product>nx-os:6.0%282%29u3%284%29</product> <product>nx-os:6.0%282%29u3%285%29</product> <product>nx-os:6.0%282%29u4%281%29</product> <product>nx-os:6.0%282%29u4%282%29</product> <product>nx-os:6.0%282%29u4%283%29</product> <product>nx-os:6.0%282%29u5%281%29</product> <product>nx-os:6.0%282%29u5%281.41%29</product> <product>nx-os:6.0%282%29u5%282%29</product> <product>nx-os:6.0%282%29u5%283%29</product> <product>nx-os:6.0%282%29u5%284%29</product> <product>nx-os:6.0%282%29u6%280.46%29</product> <product>nx-os:6.0%282%29u6%281%29</product> <product>nx-os:6.0%282%29u6%282%29</product> <product>nx-os:6.0%282%29u6%283%29</product> <product>nx-os:6.0%282%29u6%284%29</product> <product>nx-os:6.0%282%29u6%285%29</product> <product>nx-os:6.0%282%29u6%286%29</product> <product>nx-os:6.0%282%29u6%287%29</product> <product>nx-os:6.0%282%29u6%288%29</product> <product>nx-os:6.0%283%29</product> <product>nx-os:6.0%284%29</product> <product>nx-os:6.1%281%29</product> <product>nx-os:6.1%282%29</product> <product>nx-os:6.1%282%29i2%281%29</product> <product>nx-os:6.1%282%29i2%282%29</product> <product>nx-os:6.1%282%29i2%282a%29</product> <product>nx-os:6.1%282%29i2%282b%29</product> <product>nx-os:6.1%282%29i2%283%29</product> <product>nx-os:6.1%282%29i3%281%29</product> <product>nx-os:6.1%282%29i3%282%29</product> <product>nx-os:6.1%282%29i3%283%29</product> <product>nx-os:6.1%282%29i3%283.78%29</product> <product>nx-os:6.1%282%29i3%284%29</product> <product>nx-os:6.1%283%29</product> <product>nx-os:6.1%284%29</product> <product>nx-os:6.1%284a%29</product> <product>nx-os:6.1%285%29</product> <product>nx-os:6.2%282%29</product> <product>nx-os:6.2%282a%29</product> <product>nx-os:6.2%286%29</product> <product>nx-os:6.2%286b%29</product> <product>nx-os:6.2%288%29</product> <product>nx-os:6.2%288a%29</product> <product>nx-os:6.2%288b%29</product> <product>nx-os:6.2%2810%29</product> <product>nx-os:6.2%2812%29</product> <product>nx-os:6.2%2814%29s1</product> <product>nx-os:7.0%280%29n1%281%29</product> <product>nx-os:7.0%281%29n1%281%29</product> <product>nx-os:7.0%282%29n1%281%29</product> <product>nx-os:7.0%283%29</product> <product>nx-os:7.0%283%29i1%281%29</product> <product>nx-os:7.0%283%29i1%281a%29</product> <product>nx-os:7.0%283%29i1%281b%29</product> <product>nx-os:7.0%283%29i1%282%29</product> <product>nx-os:7.0%283%29i2%280.373%29</product> <product>nx-os:7.0%283%29n1%281%29</product> <product>nx-os:7.0%284%29n1%281%29</product> <product>nx-os:7.0%285%29n1%281%29</product> <product>nx-os:7.0%285%29n1%281a%29</product> <product>nx-os:7.0%286%29n1%281%29</product> <product>nx-os:7.0%287%29n1%281%29</product> <product>nx-os:7.0%288%29n1%281%29</product> <product>nx-os:7.1%280%29n1%281a%29</product> <product>nx-os:7.1%280%29n1%281b%29</product> <product>nx-os:7.1%281%29n1%281%29</product> <product>nx-os:7.1%282%29n1%281%29</product> <product>nx-os:7.1%283%29n1%281%29</product> <product>nx-os:7.1%283%29n1%282%29</product> <product>nx-os:7.1%284%29n1%281%29</product> <product>nx-os:7.2%280%29n1%280.1%29</product> <product>nx-os:7.2%280%29n1%281%29</product> <product>nx-os:7.2%281%29n1%281%29</product> <product>nx-os:11.0%281b%29</product> <product>nx-os:11.0%281c%29</product> <product>nx-os:11.0%281d%29</product> <product>nx-os:11.0%281e%29</product> <product>nx-os:11.0%282j%29</product> <product>nx-os:11.0%282m%29</product> <product>nx-os:11.0%283f%29</product> <product>nx-os:11.0%283i%29</product> <product>nx-os:11.0%283k%29</product> <product>nx-os:11.0%283n%29</product> <product>nx-os:11.0%284h%29</product> <product>nx-os:11.0%284o%29</product> <product>nx-os:11.1%281c%29</product> <product>nx-os:11.1%281j%29</product> <product>nx-os:11.1%281o%29</product> <product>nx-os:11.1%281r%29</product> <product>nx-os:11.1%281s%29</product> <product>nx-os:11.1%282h%29</product> <product>nx-os:11.1%282i%29</product> <product>nx-os:11.1%283f%29</product> <product>nx-os:11.1%284e%29</product> <product>nx-os:11.1%284f%29</product> <product>nx-os:11.1%284g%29</product> <product>nx-os:11.1%284i%29</product> <product>nx-os:11.1%284l%29</product> <product>nx-os:11.1%284m%29</product> <product>nx-os:11.2%281m%29</product> <product>nx-os:11.2%282g%29</product> <product>nx-os:11.2%282h%29</product> <product>nx-os:11.2%282i%29</product> <product>nx-os:11.2%283c%29</product> <product>nx-os:11.2%283e%29</product> <product>nx-os:11.2%283h%29</product> <product>nx-os:11.3%281i%29</product> <product>nx-os:11.3%282f%29</product> <product>nx-os:11.3%282h%29</product> <product>nx-os:11.3%282i%29</product> <product>nx-os:base</product> </cve> <cve id="CVE-2016-1455" level="LOW"> <product>nx-os:7.0%283%29</product> <product>nx-os:7.0%283%29i1%281%29</product> <product>nx-os:7.0%283%29i1%281a%29</product> <product>nx-os:7.0%283%29i1%281b%29</product> <product>nx-os:7.0%283%29i1%282%29</product> </cve> <cve id="CVE-2016-1452" level="LOW"> <product>asr_5000_software:18.3.0</product> <product>asr_5000_software:18.3_base</product> <product>asr_5000_software:19.0.1</product> <product>asr_5000_software:19.0.m0.60737</product> <product>asr_5000_software:19.0.m0.60828</product> <product>asr_5000_software:19.0.m0.61045</product> <product>asr_5000_software:19.1.0</product> <product>asr_5000_software:19.1.0.61559</product> <product>asr_5000_software:19.2.0</product> <product>asr_5000_software:19.3.0</product> <product>asr_5000_software:20.0.0</product> <product>asr_5000:-</product> </cve> <cve id="CVE-2016-1453" level="LOW"> <product>nx-os:4.1.%282%29</product> <product>nx-os:4.1.%283%29</product> <product>nx-os:4.1.%284%29</product> <product>nx-os:4.1.%285%29</product> <product>nx-os:4.2%283%29</product> <product>nx-os:4.2%284%29</product> <product>nx-os:4.2%286%29</product> <product>nx-os:4.2%288%29</product> <product>nx-os:4.2.%282a%29</product> <product>nx-os:5.0%282a%29</product> <product>nx-os:5.0%283%29</product> <product>nx-os:5.0%285%29</product> <product>nx-os:5.1%281%29</product> <product>nx-os:5.1%281a%29</product> <product>nx-os:5.1%283%29</product> <product>nx-os:5.1%284%29</product> <product>nx-os:5.1%285%29</product> <product>nx-os:5.1%286%29</product> <product>nx-os:5.2%281%29</product> <product>nx-os:5.2%283a%29</product> <product>nx-os:5.2%284%29</product> <product>nx-os:5.2%285%29</product> <product>nx-os:5.2%287%29</product> <product>nx-os:5.2%289%29</product> <product>nx-os:6.0%281%29</product> <product>nx-os:6.0%282%29</product> <product>nx-os:6.0%283%29</product> <product>nx-os:6.0%284%29</product> <product>nx-os:6.1%281%29</product> <product>nx-os:6.1%282%29</product> <product>nx-os:6.1%283%29</product> <product>nx-os:6.1%284%29</product> <product>nx-os:6.1%284a%29</product> <product>nx-os:6.1%285%29</product> <product>nx-os:6.2%282%29</product> <product>nx-os:6.2%282a%29</product> <product>nx-os:6.2%286%29</product> <product>nx-os:6.2%286b%29</product> <product>nx-os:6.2%288%29</product> <product>nx-os:6.2%288a%29</product> <product>nx-os:6.2%288b%29</product> <product>nx-os:6.2%2810%29</product> <product>nx-os:6.2%2812%29</product> <product>nx-os:6.2%2814%29s1</product> <product>nx-os:7.2%280%29n1%280.1%29</product> <product>nx-os:base</product> </cve> <cve id="CVE-2016-1450" level="MEDIUM"> <product>webex_meetings_server:2.6.0</product> <product>webex_meetings_server:2.6.1.39</product> </cve> <cve id="CVE-2016-1451" level="MEDIUM"> <product>meeting_server:1.7_base</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9_base</product> </cve> <cve id="CVE-2016-2390" level="MEDIUM"> <product>squid:3.5.13</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> </cve> <cve id="CVE-2016-2393" level="LOW"> <product>fingerprint_manager:8.01.56</product> <product>touch_fingerprint:1.00.07</product> </cve> <cve id="CVE-2016-2396" level="LOW"> <product>analyzer:7.2</product> <product>analyzer:8.0</product> <product>analyzer:8.1</product> <product>global_management_system:7.2</product> <product>global_management_system:8.0</product> <product>global_management_system:8.1</product> <product>uma_em5000_firmware:7.2</product> <product>uma_em5000_firmware:8.0</product> <product>uma_em5000_firmware:8.1</product> </cve> <cve id="CVE-2016-2397" level="LOW"> <product>analyzer:7.2</product> <product>analyzer:8.0</product> <product>analyzer:8.1</product> <product>global_management_system:7.2</product> <product>global_management_system:8.0</product> <product>global_management_system:8.1</product> <product>uma_em5000_firmware:7.2</product> <product>uma_em5000_firmware:8.0</product> <product>uma_em5000_firmware:8.1</product> </cve> <cve id="CVE-2016-2398" level="LOW"> <product>xfinity_home_security_system</product> </cve> <cve id="CVE-2016-2399" level="MEDIUM"> <product>libquicktime:1.2.4</product> </cve> <cve id="CVE-2016-1000138" level="MEDIUM"> <product>indexisto:1.0.5</product> </cve> <cve id="CVE-2016-1000139" level="MEDIUM"> <product>infusionsoft:1.5.11</product> </cve> <cve id="CVE-2016-1000130" level="MEDIUM"> <product>e-search:1.0</product> </cve> <cve id="CVE-2016-1000131" level="MEDIUM"> <product>esearch:1.0</product> </cve> <cve id="CVE-2016-1000132" level="MEDIUM"> <product>enhanced-tooltipglossary:3.2.8</product> </cve> <cve id="CVE-2016-1000133" level="MEDIUM"> <product>forget-about-shorcode-buttons:1.1.1</product> </cve> <cve id="CVE-2016-1000134" level="MEDIUM"> <product>hdw-tube:1.2</product> </cve> <cve id="CVE-2016-1000135" level="MEDIUM"> <product>hdw-tube:1.2</product> </cve> <cve id="CVE-2016-1000136" level="MEDIUM"> <product>heat-trackr:1.0</product> </cve> <cve id="CVE-2016-1000137" level="MEDIUM"> <product>hero-maps-pro:2.1.0</product> </cve> <cve id="CVE-2016-5519" level="LOW"> <product>glassfish_server:2.1.1</product> <product>glassfish_server:3.0.1</product> <product>glassfish_server:3.1.2</product> </cve> <cve id="CVE-2016-5518" level="MEDIUM"> <product>agile_engineering_data_management:6.1.3.0</product> <product>agile_engineering_data_management:6.2.0.0</product> </cve> <cve id="CVE-2016-5513" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5512" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5511" level="MEDIUM"> <product>webcenter_sites:12.2.1.0.0</product> <product>webcenter_sites:12.2.1.1.0</product> <product>webcenter_sites:12.2.1.2.0</product> </cve> <cve id="CVE-2016-5510" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-5517" level="LOW"> <product>applications_dba:12.1.3</product> </cve> <cve id="CVE-2016-1000352" level="MEDIUM"> <product>legion-of-the-bouncy-castle-java-crytography-api:1.55</product> </cve> <cve id="CVE-2016-5514" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-1209" level="LOW"> <product>ninja_forms:2.9.42</product> </cve> <cve id="CVE-2016-7552" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-0932" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0933" level="LOW"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0930" level="LOW"> <product>operations_manager:1.6.18</product> <product>operations_manager:1.7.0</product> <product>operations_manager:1.7.1</product> <product>operations_manager:1.7.2</product> <product>operations_manager:1.7.3</product> <product>operations_manager:1.7.4</product> <product>operations_manager:1.7.5</product> <product>operations_manager:1.7.6</product> <product>operations_manager:1.7.7</product> <product>operations_manager:1.7.8</product> <product>operations_manager:1.7.9</product> </cve> <cve id="CVE-2016-0931" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0936" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0937" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0934" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0935" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0938" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-0939" level="MEDIUM"> <product>acrobat:11.0.0</product> <product>acrobat:11.0.1</product> <product>acrobat:11.0.2</product> <product>acrobat:11.0.3</product> <product>acrobat:11.0.4</product> <product>acrobat:11.0.5</product> <product>acrobat:11.0.6</product> <product>acrobat:11.0.7</product> <product>acrobat:11.0.8</product> <product>acrobat:11.0.9</product> <product>acrobat:11.0.10</product> <product>acrobat:11.0.11</product> <product>acrobat:11.0.12</product> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader:11.0.0</product> <product>acrobat_reader:11.0.1</product> <product>acrobat_reader:11.0.2</product> <product>acrobat_reader:11.0.3</product> <product>acrobat_reader:11.0.4</product> <product>acrobat_reader:11.0.5</product> <product>acrobat_reader:11.0.6</product> <product>acrobat_reader:11.0.7</product> <product>acrobat_reader:11.0.8</product> <product>acrobat_reader:11.0.9</product> <product>acrobat_reader:11.0.10</product> <product>acrobat_reader:11.0.11</product> <product>acrobat_reader:11.0.12</product> <product>acrobat_reader:11.0.13</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> </cve> <cve id="CVE-2016-6097" level="LOW"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6096" level="MEDIUM"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6095" level="LOW"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6094" level="LOW"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6093" level="LOW"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6092" level="LOW"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6090" level="LOW"> <product>commerce_on_cloud:8.0.2</product> <product>commerce_on_cloud:8.0.2.1</product> <product>commerce_on_cloud:8.0.2.2</product> <product>commerce_on_cloud:8.0.2.3</product> <product>websphere_commerce:6.0</product> <product>websphere_commerce:6.0.0.1</product> <product>websphere_commerce:6.0.0.2</product> <product>websphere_commerce:6.0.0.3</product> <product>websphere_commerce:6.0.0.4</product> <product>websphere_commerce:6.0.0.5</product> <product>websphere_commerce:6.0.0.6</product> <product>websphere_commerce:6.0.0.7</product> <product>websphere_commerce:6.0.0.8</product> <product>websphere_commerce:6.0.0.9</product> <product>websphere_commerce:6.0.0.10</product> <product>websphere_commerce:6.0.0.11</product> <product>websphere_commerce:7.0</product> <product>websphere_commerce:7.0.0.1</product> <product>websphere_commerce:7.0.0.2</product> <product>websphere_commerce:7.0.0.3</product> <product>websphere_commerce:7.0.0.4</product> <product>websphere_commerce:7.0.0.5</product> <product>websphere_commerce:7.0.0.6</product> <product>websphere_commerce:7.0.0.7</product> <product>websphere_commerce:7.0.0.8</product> <product>websphere_commerce:7.0.0.9</product> <product>websphere_commerce:8.0</product> <product>websphere_commerce:8.0.0.1</product> <product>websphere_commerce:8.0.0.2</product> <product>websphere_commerce:8.0.0.3</product> <product>websphere_commerce:8.0.0.4</product> <product>websphere_commerce:8.0.0.5</product> <product>websphere_commerce:8.0.0.6</product> <product>websphere_commerce:8.0.0.7</product> <product>websphere_commerce:8.0.0.8</product> <product>websphere_commerce:8.0.0.9</product> <product>websphere_commerce:8.0.0.10</product> <product>websphere_commerce:8.0.0.11</product> <product>websphere_commerce:8.0.0.12</product> <product>websphere_commerce:8.0.0.13</product> <product>websphere_commerce:8.0.0.14</product> <product>websphere_commerce:8.0.0.15</product> <product>websphere_commerce:8.0.0.16</product> <product>websphere_commerce:8.0.1</product> <product>websphere_commerce:8.0.1.1</product> <product>websphere_commerce:8.0.1.2</product> <product>websphere_commerce:8.0.1.3</product> <product>websphere_commerce:8.0.1.4</product> <product>websphere_commerce:8.0.1.5</product> <product>websphere_commerce:8.0.1.6</product> <product>websphere_commerce:8.0.1.7</product> <product>websphere_commerce:8.0.1.8</product> <product>websphere_commerce:8.0.2</product> <product>websphere_commerce:8.0.2.1</product> <product>websphere_commerce:8.0.2.2</product> <product>websphere_commerce:8.0.2.3</product> <product>websphere_commerce:8.0.3</product> </cve> <cve id="CVE-2016-6099" level="LOW"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6098" level="LOW"> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> <product>tivoli_key_lifecycle_manager:2.0.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.1</product> <product>tivoli_key_lifecycle_manager:2.0.1.2</product> <product>tivoli_key_lifecycle_manager:2.0.1.3</product> <product>tivoli_key_lifecycle_manager:2.0.1.4</product> <product>tivoli_key_lifecycle_manager:2.0.1.5</product> <product>tivoli_key_lifecycle_manager:2.0.1.6</product> <product>tivoli_key_lifecycle_manager:2.0.1.7</product> <product>tivoli_key_lifecycle_manager:2.0.1.8</product> </cve> <cve id="CVE-2016-6899" level="MEDIUM"> <product>rh1288_v3_server_firmware:v100r003c00</product> <product>rh2288_v3_server_firmware:v100r003c00</product> <product>rh2288h_v3_server_firmware:v100r003c00</product> <product>rh5885_v3_server_firmware:v100r003c01</product> <product>xh620_v3_server_firmware:v100r003c00</product> <product>xh622_v3_server_firmware:v100r003c00</product> <product>xh628_v3_server_firmware:v100r003c00</product> </cve> <cve id="CVE-2016-6898" level="MEDIUM"> <product>e9000_chassis:v100r001c00</product> </cve> <cve id="CVE-2016-6894" level="LOW"> <product>dcs-7050q_eos_software:4.15</product> <product>dcs-7050s_eos_software:4.15</product> <product>dcs-7050t_eos_software:4.15</product> </cve> <cve id="CVE-2016-6893" level="MEDIUM"> <product>mailman:2.1</product> <product>mailman:2.1.1</product> <product>mailman:2.1.2</product> <product>mailman:2.1.3</product> <product>mailman:2.1.4</product> <product>mailman:2.1.5</product> <product>mailman:2.1.6</product> <product>mailman:2.1.8</product> <product>mailman:2.1.9</product> <product>mailman:2.1.10</product> <product>mailman:2.1.10</product> <product>mailman:2.1.10b1</product> <product>mailman:2.1.10b3</product> <product>mailman:2.1.10b4</product> <product>mailman:2.1.11</product> <product>mailman:2.1.11</product> <product>mailman:2.1.11</product> <product>mailman:2.1.12</product> <product>mailman:2.1.12</product> <product>mailman:2.1.12</product> <product>mailman:2.1.13</product> <product>mailman:2.1.13</product> <product>mailman:2.1.14</product> <product>mailman:2.1.14</product> <product>mailman:2.1.14-1</product> <product>mailman:2.1.15</product> <product>mailman:2.1.15</product> <product>mailman:2.1.16</product> <product>mailman:2.1.16</product> <product>mailman:2.1.16</product> <product>mailman:2.1.16</product> <product>mailman:2.1.17</product> <product>mailman:2.1.18</product> <product>mailman:2.1.18</product> <product>mailman:2.1.18</product> <product>mailman:2.1.18</product> <product>mailman:2.1.18-1</product> <product>mailman:2.1.19</product> <product>mailman:2.1.19</product> <product>mailman:2.1.19</product> <product>mailman:2.1.19</product> <product>mailman:2.1.20</product> <product>mailman:2.1.21</product> <product>mailman:2.1.21</product> <product>mailman:2.1.22</product> <product>mailman:2.1.23</product> </cve> <cve id="CVE-2016-6892" level="LOW"> <product>matrixssl:3.8.5</product> </cve> <cve id="CVE-2016-6891" level="LOW"> <product>matrixssl:3.8.5</product> </cve> <cve id="CVE-2016-6890" level="LOW"> <product>matrixssl:3.8.5</product> </cve> <cve id="CVE-2016-4993" level="MEDIUM"> <product>jboss_enterprise_application_platform:7.0.1</product> <product>jboss_wildfly_application_server:10.0.0</product> </cve> <cve id="CVE-2016-3607" level="LOW"> <product>glassfish_server:3.0.1</product> <product>glassfish_server:3.1.2</product> </cve> <cve id="CVE-2016-3353" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3351" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3350" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-3609" level="MEDIUM"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-3608" level="LOW"> <product>glassfish_server:3.0.1</product> </cve> <cve id="CVE-2016-8727" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8726" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8725" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8724" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8723" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8722" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8721" level="LOW"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8720" level="MEDIUM"> <product>awk-3131a_firmware:1.1</product> </cve> <cve id="CVE-2016-8729" level="MEDIUM"> <product>mupdf:1.9</product> </cve> <cve id="CVE-2016-8728" level="MEDIUM"> <product>mupdf:1.10</product> </cve> <cve id="CVE-2016-0550" level="LOW"> <product>customer_relationship_management_technical_foundation:12.1.3</product> <product>customer_relationship_management_technical_foundation:12.2.3</product> <product>customer_relationship_management_technical_foundation:12.2.4</product> <product>customer_relationship_management_technical_foundation:12.2.5</product> </cve> <cve id="CVE-2016-0551" level="LOW"> <product>customer_intelligence:11.5.10.2</product> <product>customer_intelligence:12.1.1</product> <product>customer_intelligence:12.1.2</product> <product>customer_intelligence:12.1.3</product> <product>customer_intelligence:12.2.3</product> <product>customer_intelligence:12.2.4</product> <product>customer_intelligence:12.2.5</product> </cve> <cve id="CVE-2016-0552" level="LOW"> <product>customer_intelligence:11.5.10.2</product> <product>customer_intelligence:12.1.1</product> <product>customer_intelligence:12.1.2</product> <product>customer_intelligence:12.1.3</product> <product>customer_intelligence:12.2.3</product> <product>customer_intelligence:12.2.4</product> <product>customer_intelligence:12.2.5</product> </cve> <cve id="CVE-2016-0553" level="LOW"> <product>e-business_intelligence:11.5.10.2</product> <product>e-business_intelligence:12.1.1</product> <product>e-business_intelligence:12.1.2</product> <product>e-business_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0554" level="LOW"> <product>interaction_center_intelligence:11.5.10.2</product> <product>interaction_center_intelligence:12.1.1</product> <product>interaction_center_intelligence:12.1.2</product> <product>interaction_center_intelligence:12.1.3</product> </cve> <cve id="CVE-2016-0555" level="MEDIUM"> <product>cadview-3d:11.5.10.2</product> <product>cadview-3d:12.1.1</product> <product>cadview-3d:12.1.2</product> <product>cadview-3d:12.1.3</product> </cve> <cve id="CVE-2016-0556" level="LOW"> <product>e-business_suite:11.5.10.2</product> <product>e-business_suite:12.1.1</product> <product>e-business_suite:12.1.2</product> <product>e-business_suite:12.1.3</product> </cve> <cve id="CVE-2016-0557" level="LOW"> <product>advanced_collections:11.5.10.2</product> <product>advanced_collections:12.1.1</product> <product>advanced_collections:12.1.2</product> <product>advanced_collections:12.1.3</product> </cve> <cve id="CVE-2016-0558" level="MEDIUM"> <product>service_contracts:11.5.10.2</product> <product>service_contracts:12.1.1</product> <product>service_contracts:12.1.2</product> <product>service_contracts:12.1.3</product> </cve> <cve id="CVE-2016-0559" level="LOW"> <product>customer_intelligence:11.5.10.2</product> <product>customer_intelligence:12.1.1</product> <product>customer_intelligence:12.1.2</product> <product>customer_intelligence:12.1.3</product> <product>customer_intelligence:12.2.3</product> <product>customer_intelligence:12.2.4</product> <product>customer_intelligence:12.2.5</product> </cve> <cve id="CVE-2016-1603" level="LOW"> <product>netiq_idm_servicenow_driver:1.0.0</product> </cve> <cve id="CVE-2016-1601" level="LOW"> <product>yast2</product> </cve> <cve id="CVE-2016-1607" level="LOW"> <product>filr:1.2</product> <product>filr:2.0</product> </cve> <cve id="CVE-2016-1606" level="LOW"> <product>rumba:9.4</product> </cve> <cve id="CVE-2016-1605" level="LOW"> <product>sentinel:7.4</product> <product>sentinel:7.4.1</product> </cve> <cve id="CVE-2016-1609" level="MEDIUM"> <product>filr:1.2</product> <product>filr:2.0</product> </cve> <cve id="CVE-2016-1608" level="LOW"> <product>filr:1.2</product> <product>filr:2.0</product> </cve> <cve id="CVE-2016-8583" level="MEDIUM"> <product>open_source_security_information_and_event_management:5.3.1</product> <product>unified_security_management:5.3.1</product> </cve> <cve id="CVE-2016-8582" level="LOW"> <product>open_source_security_information_and_event_management:5.3.1</product> <product>unified_security_management:5.3.1</product> </cve> <cve id="CVE-2016-8581" level="MEDIUM"> <product>open_source_security_information_and_event_management:5.3.1</product> <product>unified_security_management:5.3.1</product> </cve> <cve id="CVE-2016-8580" level="LOW"> <product>open_source_security_information_and_event_management:5.3.1</product> <product>unified_security_management:5.3.1</product> </cve> <cve id="CVE-2016-8587" level="MEDIUM"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8586" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8585" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8584" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8589" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-8588" level="MEDIUM"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-7854" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7856" level="LOW"> <product>dng_converter:9.7</product> </cve> <cve id="CVE-2016-7851" level="MEDIUM"> <product>connect:9.5.6</product> </cve> <cve id="CVE-2016-7852" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7853" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-9456" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9457" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9454" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9455" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9452" level="MEDIUM"> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> <product>drupal:8.1.10</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.1</product> <product>drupal:8.2.2</product> </cve> <cve id="CVE-2016-9453" level="MEDIUM"> <product>libtiff</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9450" level="LOW"> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> <product>drupal:8.1.3</product> <product>drupal:8.1.4</product> <product>drupal:8.1.5</product> <product>drupal:8.1.6</product> <product>drupal:8.1.7</product> <product>drupal:8.1.8</product> <product>drupal:8.1.9</product> <product>drupal:8.1.10</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.0</product> <product>drupal:8.2.1</product> <product>drupal:8.2.2</product> </cve> <cve id="CVE-2016-9451" level="MEDIUM"> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.1</product> <product>drupal:7.2</product> <product>drupal:7.3</product> <product>drupal:7.4</product> <product>drupal:7.10</product> <product>drupal:7.11</product> <product>drupal:7.12</product> <product>drupal:7.13</product> <product>drupal:7.14</product> <product>drupal:7.15</product> <product>drupal:7.16</product> <product>drupal:7.17</product> <product>drupal:7.18</product> <product>drupal:7.19</product> <product>drupal:7.20</product> <product>drupal:7.21</product> <product>drupal:7.22</product> <product>drupal:7.23</product> <product>drupal:7.24</product> <product>drupal:7.25</product> <product>drupal:7.26</product> <product>drupal:7.27</product> <product>drupal:7.28</product> <product>drupal:7.29</product> <product>drupal:7.30</product> <product>drupal:7.31</product> <product>drupal:7.32</product> <product>drupal:7.33</product> <product>drupal:7.34</product> <product>drupal:7.35</product> <product>drupal:7.36</product> <product>drupal:7.37</product> <product>drupal:7.38</product> <product>drupal:7.40</product> <product>drupal:7.41</product> <product>drupal:7.42</product> <product>drupal:7.43</product> <product>drupal:7.44</product> <product>drupal:7.50</product> <product>drupal:7.51</product> </cve> <cve id="CVE-2016-9988" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> <product>jazz_reporting_service:6.0.3</product> </cve> <cve id="CVE-2016-10079" level="LOW"> <product>saplpd:7400.3.11.33</product> </cve> <cve id="CVE-2016-9459" level="MEDIUM"> <product>nextcloud:9.0.51</product> <product>owncloud:8.1.8</product> <product>owncloud:8.2.6</product> <product>owncloud:9.0.3</product> </cve> <cve id="CVE-2016-5729" level="LOW"> <product>bios_efi_driver:-</product> </cve> <cve id="CVE-2016-5725" level="MEDIUM"> <product>jsch:0.1.53</product> </cve> <cve id="CVE-2016-5726" level="LOW"> <product>simple_machines_forum:2.1</product> </cve> <cve id="CVE-2016-5727" level="MEDIUM"> <product>simple_machines_forum:2.1</product> </cve> <cve id="CVE-2016-5720" level="LOW"> <product>skype:-</product> </cve> <cve id="CVE-2016-5721" level="MEDIUM"> <product>zimbra_collaboration_server:8.6.0</product> </cve> <cve id="CVE-2016-5722" level="LOW"> <product>ocean_stor_firmware:v300r002c10spc200</product> <product>ocean_stor_firmware:v300r003c00spc100</product> </cve> <cve id="CVE-2016-5723" level="LOW"> <product>fusioninsight_hd:v100r002c30</product> <product>fusioninsight_hd:v100r002c50</product> </cve> <cve id="CVE-2016-9188" level="MEDIUM"> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-9184" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9185" level="LOW"> <product>heat:5.0.3</product> <product>heat:6.0.0</product> <product>heat:6.1.0</product> <product>heat:7.0.0</product> </cve> <cve id="CVE-2016-9186" level="LOW"> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-9187" level="LOW"> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-9180" level="LOW"> <product>xml-twig_for_perl:-</product> </cve> <cve id="CVE-2016-9181" level="MEDIUM"> <product>image-info_for_perl:1.16</product> <product>image-info_for_perl:1.30</product> </cve> <cve id="CVE-2016-9182" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9183" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9676" level="LOW"> <product>provisioning_services:7.0</product> <product>provisioning_services:7.1</product> <product>provisioning_services:7.6</product> <product>provisioning_services:7.7</product> <product>provisioning_services:7.8</product> <product>provisioning_services:7.9</product> <product>provisioning_services:7.11</product> </cve> <cve id="CVE-2016-9677" level="LOW"> <product>provisioning_services:7.0</product> <product>provisioning_services:7.1</product> <product>provisioning_services:7.6</product> <product>provisioning_services:7.7</product> <product>provisioning_services:7.8</product> <product>provisioning_services:7.9</product> <product>provisioning_services:7.11</product> </cve> <cve id="CVE-2016-9675" level="MEDIUM"> <product>openjpeg</product> </cve> <cve id="CVE-2016-9678" level="LOW"> <product>provisioning_services:7.0</product> <product>provisioning_services:7.1</product> <product>provisioning_services:7.6</product> <product>provisioning_services:7.7</product> <product>provisioning_services:7.8</product> <product>provisioning_services:7.9</product> <product>provisioning_services:7.11</product> </cve> <cve id="CVE-2016-9679" level="LOW"> <product>provisioning_services:7.0</product> <product>provisioning_services:7.1</product> <product>provisioning_services:7.6</product> <product>provisioning_services:7.7</product> <product>provisioning_services:7.8</product> <product>provisioning_services:7.9</product> <product>provisioning_services:7.11</product> </cve> <cve id="CVE-2016-3622" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-7116" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-0208" level="MEDIUM"> <product>websphere_commerce:6.0</product> <product>websphere_commerce:6.0.0.1</product> <product>websphere_commerce:6.0.0.2</product> <product>websphere_commerce:6.0.0.3</product> <product>websphere_commerce:6.0.0.4</product> <product>websphere_commerce:6.0.0.5</product> <product>websphere_commerce:6.0.0.6</product> <product>websphere_commerce:6.0.0.7</product> <product>websphere_commerce:6.0.0.8</product> <product>websphere_commerce:6.0.0.9</product> <product>websphere_commerce:6.0.0.10</product> <product>websphere_commerce:6.0.0.11</product> <product>websphere_commerce:7.0</product> <product>websphere_commerce:7.0.0.1</product> <product>websphere_commerce:7.0.0.2</product> <product>websphere_commerce:7.0.0.3</product> <product>websphere_commerce:7.0.0.4</product> <product>websphere_commerce:7.0.0.5</product> <product>websphere_commerce:7.0.0.6</product> <product>websphere_commerce:7.0.0.7</product> <product>websphere_commerce:7.0.0.8</product> <product>websphere_commerce:7.0.0.9</product> <product>websphere_commerce:8.0</product> <product>websphere_commerce:8.0.0.1</product> <product>websphere_commerce:8.0.0.2</product> </cve> <cve id="CVE-2016-2989" level="MEDIUM"> <product>connections_portlets:5.0</product> </cve> <cve id="CVE-2016-2988" level="HIGH"> <product>tivoli_storage_manager_for_virtual_environments:6.4</product> <product>tivoli_storage_manager_for_virtual_environments:7.1</product> </cve> <cve id="CVE-2016-2985" level="MEDIUM"> <product>general_parallel_file_system:3.5.0.0</product> <product>general_parallel_file_system:3.5.0.1</product> <product>general_parallel_file_system:3.5.0.2</product> <product>general_parallel_file_system:3.5.0.3</product> <product>general_parallel_file_system:3.5.0.4</product> <product>general_parallel_file_system:3.5.0.5</product> <product>general_parallel_file_system:3.5.0.6</product> <product>general_parallel_file_system:3.5.0.7</product> <product>general_parallel_file_system:3.5.0.8</product> <product>general_parallel_file_system:3.5.0.9</product> <product>general_parallel_file_system:3.5.0.10</product> <product>general_parallel_file_system:3.5.0.11</product> <product>general_parallel_file_system:3.5.0.12</product> <product>general_parallel_file_system:3.5.0.13</product> <product>general_parallel_file_system:3.5.0.14</product> <product>general_parallel_file_system:3.5.0.15</product> <product>general_parallel_file_system:3.5.0.16</product> <product>general_parallel_file_system:3.5.0.17</product> <product>general_parallel_file_system:3.5.0.18</product> <product>general_parallel_file_system:3.5.0.19</product> <product>general_parallel_file_system:3.5.0.20</product> <product>general_parallel_file_system:3.5.0.21</product> <product>general_parallel_file_system:3.5.0.22</product> <product>general_parallel_file_system:3.5.0.23</product> <product>general_parallel_file_system:3.5.0.24</product> <product>general_parallel_file_system:3.5.0.25</product> <product>general_parallel_file_system:3.5.0.26</product> <product>general_parallel_file_system:3.5.0.27</product> <product>general_parallel_file_system:3.5.0.28</product> <product>general_parallel_file_system:3.5.0.29</product> <product>general_parallel_file_system:3.5.0.30</product> <product>general_parallel_file_system:3.5.0.31</product> <product>general_parallel_file_system:4.1.0.0</product> <product>general_parallel_file_system:4.1.0.1</product> <product>general_parallel_file_system:4.1.0.2</product> <product>general_parallel_file_system:4.1.0.3</product> <product>general_parallel_file_system:4.1.0.4</product> <product>general_parallel_file_system:4.1.0.5</product> <product>general_parallel_file_system:4.1.0.6</product> <product>general_parallel_file_system:4.1.0.7</product> <product>general_parallel_file_system:4.1.0.8</product> <product>spectrum_scale:4.1.1.0</product> <product>spectrum_scale:4.1.1.1</product> <product>spectrum_scale:4.1.1.2</product> <product>spectrum_scale:4.1.1.3</product> <product>spectrum_scale:4.1.1.4</product> <product>spectrum_scale:4.1.1.5</product> <product>spectrum_scale:4.1.1.6</product> <product>spectrum_scale:4.1.1.7</product> <product>spectrum_scale:4.1.1.8</product> <product>spectrum_scale:4.2.0.0</product> <product>spectrum_scale:4.2.0.1</product> <product>spectrum_scale:4.2.0.2</product> <product>spectrum_scale:4.2.0.3</product> </cve> <cve id="CVE-2016-2984" level="MEDIUM"> <product>general_parallel_file_system:3.5.0.0</product> <product>general_parallel_file_system:3.5.0.1</product> <product>general_parallel_file_system:3.5.0.2</product> <product>general_parallel_file_system:3.5.0.3</product> <product>general_parallel_file_system:3.5.0.4</product> <product>general_parallel_file_system:3.5.0.5</product> <product>general_parallel_file_system:3.5.0.6</product> <product>general_parallel_file_system:3.5.0.7</product> <product>general_parallel_file_system:3.5.0.8</product> <product>general_parallel_file_system:3.5.0.9</product> <product>general_parallel_file_system:3.5.0.10</product> <product>general_parallel_file_system:3.5.0.11</product> <product>general_parallel_file_system:3.5.0.12</product> <product>general_parallel_file_system:3.5.0.13</product> <product>general_parallel_file_system:3.5.0.14</product> <product>general_parallel_file_system:3.5.0.15</product> <product>general_parallel_file_system:3.5.0.16</product> <product>general_parallel_file_system:3.5.0.17</product> <product>general_parallel_file_system:3.5.0.18</product> <product>general_parallel_file_system:3.5.0.19</product> <product>general_parallel_file_system:3.5.0.20</product> <product>general_parallel_file_system:3.5.0.21</product> <product>general_parallel_file_system:3.5.0.22</product> <product>general_parallel_file_system:3.5.0.23</product> <product>general_parallel_file_system:3.5.0.24</product> <product>general_parallel_file_system:3.5.0.25</product> <product>general_parallel_file_system:3.5.0.26</product> <product>general_parallel_file_system:3.5.0.27</product> <product>general_parallel_file_system:3.5.0.28</product> <product>general_parallel_file_system:3.5.0.29</product> <product>general_parallel_file_system:3.5.0.30</product> <product>general_parallel_file_system:3.5.0.31</product> <product>general_parallel_file_system:4.1.0.0</product> <product>general_parallel_file_system:4.1.0.1</product> <product>general_parallel_file_system:4.1.0.2</product> <product>general_parallel_file_system:4.1.0.3</product> <product>general_parallel_file_system:4.1.0.4</product> <product>general_parallel_file_system:4.1.0.5</product> <product>general_parallel_file_system:4.1.0.6</product> <product>general_parallel_file_system:4.1.0.7</product> <product>general_parallel_file_system:4.1.0.8</product> <product>spectrum_scale:4.1.1.0</product> <product>spectrum_scale:4.1.1.1</product> <product>spectrum_scale:4.1.1.2</product> <product>spectrum_scale:4.1.1.3</product> <product>spectrum_scale:4.1.1.4</product> <product>spectrum_scale:4.1.1.5</product> <product>spectrum_scale:4.1.1.6</product> <product>spectrum_scale:4.1.1.7</product> <product>spectrum_scale:4.1.1.8</product> <product>spectrum_scale:4.2.0.0</product> <product>spectrum_scale:4.2.0.1</product> <product>spectrum_scale:4.2.0.2</product> <product>spectrum_scale:4.2.0.3</product> </cve> <cve id="CVE-2016-2987" level="LOW"> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-2986" level="MEDIUM"> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-2981" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> </cve> <cve id="CVE-2016-2980" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2983" level="MEDIUM"> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.2</product> </cve> <cve id="CVE-2016-0209" level="MEDIUM"> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-1134" level="MEDIUM"> <product>bhr-4grv2_firmware:1.04</product> <product>wex-300_firmware:1.90</product> <product>whr-1166dhp_firmware:1.90</product> <product>whr-300hp2_firmware:1.90</product> <product>whr-600d_firmware:1.90</product> <product>wmr-300_firmware:1.90</product> <product>wmr-433_firmware:1.01</product> <product>wsr-1166dhp_firmware:1.01</product> </cve> <cve id="CVE-2016-0204" level="MEDIUM"> <product>cloud_orchestrator:2.4.0.0</product> <product>cloud_orchestrator:2.4.0.1</product> <product>cloud_orchestrator:2.4.0.2</product> </cve> <cve id="CVE-2016-1132" level="LOW"> <product>shoplat:-</product> </cve> <cve id="CVE-2016-1988" level="LOW"> <product>network_automation:9.22</product> <product>network_automation:9.22.01</product> <product>network_automation:9.22.02</product> <product>network_automation:10.00</product> <product>network_automation:10.00.01</product> </cve> <cve id="CVE-2016-1989" level="LOW"> <product>network_automation:9.22</product> <product>network_automation:9.22.01</product> <product>network_automation:9.22.02</product> <product>network_automation:10.00</product> <product>network_automation:10.00.01</product> </cve> <cve id="CVE-2016-1984" level="LOW"> <product>amx_firmware:1.2.322</product> <product>amx_firmware:1.3.100</product> </cve> <cve id="CVE-2016-1985" level="LOW"> <product>operations_manager:8.1</product> <product>operations_manager:8.10</product> <product>operations_manager:8.16</product> <product>operations_manager:9.0</product> </cve> <cve id="CVE-2016-1986" level="LOW"> <product>continuous_delivery_automation:1.3.0</product> </cve> <cve id="CVE-2016-1987" level="HIGH"> <product>hp-ux_ipfilter:a.11.31.18.21</product> </cve> <cve id="CVE-2016-1981" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-1982" level="LOW"> <product>privoxy:3.0.23</product> </cve> <cve id="CVE-2016-1983" level="LOW"> <product>privoxy:3.0.23</product> </cve> <cve id="CVE-2016-3726" level="MEDIUM"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-3727" level="LOW"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-3724" level="LOW"> <product>jenkins:1.649</product> <product>jenkins:1.651.1</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-3725" level="LOW"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-6408" level="MEDIUM"> <product>prime_home:5.2.0</product> </cve> <cve id="CVE-2016-3722" level="LOW"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-6406" level="LOW"> <product>email_security_appliance_firmware:9.1.2-023</product> <product>email_security_appliance_firmware:9.1.2-028</product> <product>email_security_appliance_firmware:9.1.2-036</product> <product>email_security_appliance_firmware:9.7.2-046</product> <product>email_security_appliance_firmware:9.7.2-047</product> <product>email_security_appliance_firmware:9.7.2-054</product> <product>email_security_appliance_firmware:10.0.0-124</product> <product>email_security_appliance_firmware:10.0.0-125</product> </cve> <cve id="CVE-2016-6407" level="LOW"> <product>web_security_appliance:5.6.0-623</product> <product>web_security_appliance:6.0.0-000</product> <product>web_security_appliance:7.1.0</product> <product>web_security_appliance:7.1.1</product> <product>web_security_appliance:7.1.2</product> <product>web_security_appliance:7.1.3</product> <product>web_security_appliance:7.1.4</product> <product>web_security_appliance:7.5.0-000</product> <product>web_security_appliance:7.5.0-825</product> <product>web_security_appliance:7.5.1-000</product> <product>web_security_appliance:7.5.2-000</product> <product>web_security_appliance:7.5.2-hp2-303</product> <product>web_security_appliance:7.7.0-000</product> <product>web_security_appliance:7.7.0-608</product> <product>web_security_appliance:7.7.1-000</product> <product>web_security_appliance:7.7.5-835</product> <product>web_security_appliance:8.0.0-000</product> <product>web_security_appliance:8.0.5</product> <product>web_security_appliance:8.0.6</product> <product>web_security_appliance:8.0.6-078</product> <product>web_security_appliance:8.0.6-119</product> <product>web_security_appliance:8.0.7</product> <product>web_security_appliance:8.0.7-142</product> <product>web_security_appliance:8.0.8-mr-113</product> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:8.5.0.000</product> <product>web_security_appliance:8.5.1-021</product> <product>web_security_appliance:8.5.2-024</product> <product>web_security_appliance:8.5.2-027</product> <product>web_security_appliance:8.5.3-055</product> <product>web_security_appliance:8.8.0-000</product> <product>web_security_appliance:8.8.0-085</product> <product>web_security_appliance:9.0.0-193</product> <product>web_security_appliance:9.0_base</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1.0-070</product> <product>web_security_appliance:9.1_base</product> <product>web_security_appliance:9.5.0-235</product> <product>web_security_appliance:9.5.0-284</product> <product>web_security_appliance:9.5.0-444</product> <product>web_security_appliance:9.5_base</product> </cve> <cve id="CVE-2016-6401" level="MEDIUM"> <product>carrier_routing_system:5.1.4</product> <product>carrier_routing_system:5.1_base</product> </cve> <cve id="CVE-2016-6402" level="LOW"> <product>unified_computing_system:2.2%281b%29</product> <product>unified_computing_system:2.2%281c%29</product> <product>unified_computing_system:2.2%281d%29</product> <product>unified_computing_system:2.2%281e%29</product> <product>unified_computing_system:2.2%281f%29</product> <product>unified_computing_system:2.2%281g%29</product> <product>unified_computing_system:2.2%281h%29</product> <product>unified_computing_system:2.2%282c%29</product> <product>unified_computing_system:2.2%282c%29a</product> <product>unified_computing_system:2.2%282d%29</product> <product>unified_computing_system:2.2%282e%29</product> <product>unified_computing_system:2.2%283a%29</product> <product>unified_computing_system:2.2%283b%29</product> <product>unified_computing_system:2.2%283c%29</product> <product>unified_computing_system:2.2%283d%29</product> <product>unified_computing_system:2.2%283e%29</product> <product>unified_computing_system:2.2%283f%29</product> <product>unified_computing_system:2.2%283g%29</product> <product>unified_computing_system:2.2%284b%29</product> <product>unified_computing_system:2.2%284c%29</product> <product>unified_computing_system:2.2%285a%29</product> <product>unified_computing_system:2.2%285b%29a</product> <product>unified_computing_system:2.2_base</product> <product>unified_computing_system:3.0%281c%29</product> <product>unified_computing_system:3.0%281d%29</product> <product>unified_computing_system:3.0%281e%29</product> <product>unified_computing_system:3.0%282c%29</product> <product>unified_computing_system:3.0%282d%29</product> </cve> <cve id="CVE-2016-3723" level="LOW"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-0129" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-0123" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-3721" level="LOW"> <product>jenkins:1.651.1</product> <product>jenkins:2.2</product> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-0125" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-0124" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-4808" level="MEDIUM"> <product>web2py:2.14.5</product> </cve> <cve id="CVE-2016-4802" level="MEDIUM"> <product>curl:7.49.0</product> </cve> <cve id="CVE-2016-4803" level="LOW"> <product>dotcms:3.3.1</product> </cve> <cve id="CVE-2016-4800" level="LOW"> <product>jetty:9.3.0</product> <product>jetty:9.3.0</product> <product>jetty:9.3.0</product> <product>jetty:9.3.0</product> <product>jetty:9.3.0</product> <product>jetty:9.3.0</product> <product>jetty:9.3.1</product> <product>jetty:9.3.2</product> <product>jetty:9.3.3</product> <product>jetty:9.3.4</product> <product>jetty:9.3.4</product> <product>jetty:9.3.4</product> <product>jetty:9.3.5</product> <product>jetty:9.3.6</product> <product>jetty:9.3.7</product> <product>jetty:9.3.7</product> <product>jetty:9.3.7</product> <product>jetty:9.3.8</product> <product>jetty:9.3.8</product> </cve> <cve id="CVE-2016-4806" level="LOW"> <product>web2py:2.14.5</product> </cve> <cve id="CVE-2016-4807" level="MEDIUM"> <product>web2py:2.14.5</product> </cve> <cve id="CVE-2016-6668" level="LOW"> <product>confluence:5.5.0</product> <product>confluence:5.9.1</product> <product>confluence:5.9.2</product> <product>confluence:5.9.3</product> <product>confluence:5.9.4</product> <product>confluence:5.9.5</product> <product>confluence:5.9.6</product> <product>confluence:5.9.7</product> <product>confluence:5.9.8</product> <product>confluence:5.9.9</product> <product>confluence:5.9.10</product> <product>confluence:5.9.11</product> <product>confluence:5.9.12</product> <product>confluence:5.10.0</product> <product>confluence:5.10.1</product> <product>confluence:5.10.2</product> <product>confluence:5.10.3</product> <product>jira_integration_for_hipchat:6.26.0</product> <product>jira_integration_for_hipchat:6.26.10</product> <product>jira_integration_for_hipchat:6.29.1</product> <product>jira_integration_for_hipchat:6.29.2</product> <product>jira_integration_for_hipchat:6.31.0</product> <product>jira_integration_for_hipchat:7.1.0</product> <product>jira_integration_for_hipchat:7.2.1</product> <product>jira_integration_for_hipchat:7.3.2</product> <product>jira_integration_for_hipchat:7.3.3</product> <product>jira_integration_for_hipchat:7.4.1</product> <product>jira_integration_for_hipchat:7.8.1</product> <product>jira_integration_for_hipchat:7.8.3</product> <product>jira_integration_for_hipchat:7.8.12</product> </cve> <cve id="CVE-2016-6669" level="HIGH"> <product>usg2100_firmware:v300r001c00</product> <product>usg2100_firmware:v300r001c10</product> <product>usg2200_firmware:v300r001c00</product> <product>usg2200_firmware:v300r001c10</product> <product>usg5100_firmware:v300r001c00</product> <product>usg5100_firmware:v300r001c10</product> <product>usg5500_firmware:v300r001c00</product> <product>usg5500_firmware:v300r001c10</product> </cve> <cve id="CVE-2016-3292" level="HIGH"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3293" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3290" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3291" level="HIGH"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3296" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-3297" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3294" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-6667" level="LOW"> <product>oncommand_unified_manager_for_clustered_data_ontap:6.3</product> <product>oncommand_unified_manager_for_clustered_data_ontap:6.4</product> <product>oncommand_unified_manager_for_clustered_data_ontap:6.4</product> </cve> <cve id="CVE-2016-7139" level="MEDIUM"> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-7138" level="MEDIUM"> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-7137" level="MEDIUM"> <product>plone:3.3</product> <product>plone:3.3.1</product> <product>plone:3.3.2</product> <product>plone:3.3.3</product> <product>plone:3.3.4</product> <product>plone:3.3.5</product> <product>plone:3.3.6</product> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-7136" level="MEDIUM"> <product>plone:4.0</product> <product>plone:4.0.1</product> <product>plone:4.0.2</product> <product>plone:4.0.3</product> <product>plone:4.0.4</product> <product>plone:4.0.5</product> <product>plone:4.0.7</product> <product>plone:4.0.8</product> <product>plone:4.0.9</product> <product>plone:4.0.10</product> <product>plone:4.1</product> <product>plone:4.1.1</product> <product>plone:4.1.2</product> <product>plone:4.1.3</product> <product>plone:4.1.4</product> <product>plone:4.1.5</product> <product>plone:4.1.6</product> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-7135" level="LOW"> <product>plone:4.2</product> <product>plone:4.2.1</product> <product>plone:4.2.2</product> <product>plone:4.2.3</product> <product>plone:4.2.4</product> <product>plone:4.2.5</product> <product>plone:4.2.6</product> <product>plone:4.2.7</product> <product>plone:4.3</product> <product>plone:4.3.1</product> <product>plone:4.3.2</product> <product>plone:4.3.3</product> <product>plone:4.3.4</product> <product>plone:4.3.5</product> <product>plone:4.3.6</product> <product>plone:4.3.7</product> <product>plone:4.3.8</product> <product>plone:4.3.9</product> <product>plone:4.3.10</product> <product>plone:4.3.11</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0</product> <product>plone:5.0.1</product> <product>plone:5.0.2</product> <product>plone:5.0.3</product> <product>plone:5.0.4</product> <product>plone:5.0.5</product> <product>plone:5.0.6</product> <product>plone:5.1a1</product> </cve> <cve id="CVE-2016-9867" level="LOW"> <product>scaleio:2.0.1.0</product> </cve> <cve id="CVE-2016-9866" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9865" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9864" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9863" level="LOW"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9862" level="LOW"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9861" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9860" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.0.10.17</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.4.15.8</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> <product>phpmyadmin:4.6.4</product> </cve> <cve id="CVE-2016-9869" level="LOW"> <product>scaleio:2.0.1.0</product> </cve> <cve id="CVE-2016-8973" level="LOW"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-10626" level="MEDIUM"> <product>mystem3:1.0.7</product> </cve> <cve id="CVE-2016-10155" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-10156" level="LOW"> <product>systemd:228</product> </cve> <cve id="CVE-2016-10157" level="LOW"> <product>netsession:1.9.3.1</product> </cve> <cve id="CVE-2016-10623" level="MEDIUM"> <product>macaca-chromedriver-zxa:0.1.9</product> </cve> <cve id="CVE-2016-10152" level="LOW"> <product>hesiod:3.2.1</product> </cve> <cve id="CVE-2016-10621" level="MEDIUM"> <product>fibjs:0.1.8</product> </cve> <cve id="CVE-2016-10628" level="MEDIUM"> <product>selenium-wrapper:0.0.9</product> </cve> <cve id="CVE-2016-10629" level="MEDIUM"> <product>nw-with-arm:0.12.2</product> </cve> <cve id="CVE-2016-1298" level="MEDIUM"> <product>unified_contact_center_express:10.0%281%29</product> <product>unified_contact_center_express:10.5%281%29</product> <product>unified_contact_center_express:10.6%281%29</product> <product>unified_contact_center_express:11.0%281%29</product> </cve> <cve id="CVE-2016-1299" level="LOW"> <product>300_series_managed_switch_firmware:1.4.1</product> </cve> <cve id="CVE-2016-1290" level="LOW"> <product>evolved_programmable_network_manager:1.2.0</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:2.2%5c%282%5c%29</product> </cve> <cve id="CVE-2016-1291" level="MEDIUM"> <product>evolved_programmable_network_manager:1.2.0</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:2.2%5c%282%5c%29</product> </cve> <cve id="CVE-2016-1293" level="MEDIUM"> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-1294" level="MEDIUM"> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-1295" level="LOW"> <product>adaptive_security_appliance_software:8.4.0</product> <product>adaptive_security_appliance_software:8.4.1</product> <product>adaptive_security_appliance_software:8.4.1.3</product> <product>adaptive_security_appliance_software:8.4.1.11</product> <product>adaptive_security_appliance_software:8.4.2</product> <product>adaptive_security_appliance_software:8.4.2.1</product> <product>adaptive_security_appliance_software:8.4.2.8</product> <product>adaptive_security_appliance_software:8.4.3</product> <product>adaptive_security_appliance_software:8.4.3.8</product> <product>adaptive_security_appliance_software:8.4.3.9</product> <product>adaptive_security_appliance_software:8.4.4</product> <product>adaptive_security_appliance_software:8.4.4.1</product> <product>adaptive_security_appliance_software:8.4.4.3</product> <product>adaptive_security_appliance_software:8.4.4.5</product> <product>adaptive_security_appliance_software:8.4.4.9</product> <product>adaptive_security_appliance_software:8.4.5</product> <product>adaptive_security_appliance_software:8.4.5.6</product> <product>adaptive_security_appliance_software:8.4.6</product> <product>adaptive_security_appliance_software:8.4.7</product> <product>adaptive_security_appliance_software:8.4.7.3</product> <product>adaptive_security_appliance_software:8.4.7.15</product> <product>adaptive_security_appliance_software:8.4.7.22</product> <product>adaptive_security_appliance_software:8.4.7.23</product> <product>adaptive_security_appliance_software:8.4.7.26</product> <product>adaptive_security_appliance_software:8.4.7.28</product> <product>adaptive_security_appliance_software:8.4.7.29</product> </cve> <cve id="CVE-2016-1296" level="LOW"> <product>web_security_appliance:8.5.3-055</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.5.0-235</product> </cve> <cve id="CVE-2016-1297" level="LOW"> <product>application_control_engine_software:a5%281.0%29</product> <product>application_control_engine_software:a5%281.1%29</product> <product>application_control_engine_software:a5%281.2%29</product> <product>application_control_engine_software:a5%282.0%29</product> <product>application_control_engine_software:a5%282.1%29</product> <product>application_control_engine_software:a5%282.1e%29</product> <product>application_control_engine_software:a5%283.0%29</product> </cve> <cve id="CVE-2016-9249" level="LOW"> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> </cve> <cve id="CVE-2016-2403" level="LOW"> <product>symfony:2.8.0</product> <product>symfony:2.8.1</product> <product>symfony:2.8.2</product> <product>symfony:2.8.3</product> <product>symfony:2.8.4</product> <product>symfony:2.8.5</product> <product>symfony:3.0.0</product> <product>symfony:3.0.1</product> <product>symfony:3.0.2</product> <product>symfony:3.0.3</product> <product>symfony:3.0.4</product> <product>symfony:3.0.5</product> </cve> <cve id="CVE-2016-2404" level="MEDIUM"> <product>acu2_firmware:v200r005c00spc500</product> <product>acu2_firmware:v200r006c00</product> <product>s12700_firmware:v200r005c00spc500</product> <product>s12700_firmware:v200r006c00</product> <product>s5700_firmware:v200r001c00spc300</product> <product>s5700_firmware:v200r002c00spc100</product> <product>s5700_firmware:v200r003c00spc300</product> <product>s5700_firmware:v200r005c00spc500</product> <product>s5700_firmware:v200r006c00</product> <product>s6700_firmware:v200r001c00spc300</product> <product>s6700_firmware:v200r002c00spc100</product> <product>s6700_firmware:v200r003c00spc300</product> <product>s6700_firmware:v200r005c00spc500</product> <product>s6700_firmware:v200r006c00</product> <product>s7700_firmware:v200r001c00spc300</product> <product>s7700_firmware:v200r002c00spc100</product> <product>s7700_firmware:v200r003c00spc300</product> <product>s7700_firmware:v200r005c00spc500</product> <product>s7700_firmware:v200r006c00</product> <product>s9700_firmware:v200r001c00spc300</product> <product>s9700_firmware:v200r002c00spc100</product> <product>s9700_firmware:v200r003c00spc300</product> <product>s9700_firmware:v200r005c00spc500</product> <product>s9700_firmware:v200r006c00</product> </cve> <cve id="CVE-2016-2405" level="LOW"> <product>policy_center_firmware:v100r003c10</product> </cve> <cve id="CVE-2016-2406" level="LOW"> <product>document_security_management:v100r002c05spc661</product> </cve> <cve id="CVE-2016-2408" level="LOW"> <product>odyssey_access_client:5.6r16.0</product> <product>pulse_secure_desktop:5.0r1.0</product> <product>pulse_secure_desktop:5.0r2.0</product> <product>pulse_secure_desktop:5.0r3.0</product> <product>pulse_secure_desktop:5.0r3.1</product> <product>pulse_secure_desktop:5.0r4.0</product> <product>pulse_secure_desktop:5.0r4.1</product> <product>pulse_secure_desktop:5.0r5.0</product> <product>pulse_secure_desktop:5.0r6.0</product> <product>pulse_secure_desktop:5.0r7.0</product> <product>pulse_secure_desktop:5.0r8.0</product> <product>pulse_secure_desktop:5.0r8.1</product> <product>pulse_secure_desktop:5.0r9.0</product> <product>pulse_secure_desktop:5.0r10.0</product> <product>pulse_secure_desktop:5.0r11.0</product> <product>pulse_secure_desktop:5.0r12.0</product> <product>pulse_secure_desktop:5.0r13.0</product> <product>pulse_secure_desktop:5.0r13.1</product> <product>pulse_secure_desktop:5.0r14.0</product> <product>pulse_secure_desktop:5.0r15.0</product> <product>pulse_secure_desktop:5.1r1.0</product> <product>pulse_secure_desktop:5.1r1.1</product> <product>pulse_secure_desktop:5.1r2.0</product> <product>pulse_secure_desktop:5.1r3.0</product> <product>pulse_secure_desktop:5.1r3.1</product> <product>pulse_secure_desktop:5.1r3.2</product> <product>pulse_secure_desktop:5.1r4.0</product> <product>pulse_secure_desktop:5.1r5.0</product> <product>pulse_secure_desktop:5.1r5.1</product> <product>pulse_secure_desktop:5.1r6.0</product> <product>pulse_secure_desktop:5.1r7.0</product> <product>pulse_secure_desktop:5.1r8.0</product> <product>pulse_secure_desktop:5.1r9.0</product> <product>pulse_secure_desktop:5.2r1.0</product> <product>pulse_secure_desktop:5.2r1.1</product> <product>pulse_secure_desktop:5.2r2.0</product> <product>pulse_secure_security:8.0r1.0</product> <product>pulse_secure_security:8.0r1.1</product> <product>pulse_secure_security:8.0r2.0</product> <product>pulse_secure_security:8.0r3.0</product> <product>pulse_secure_security:8.0r3.1</product> <product>pulse_secure_security:8.0r3.2</product> <product>pulse_secure_security:8.0r4.0</product> <product>pulse_secure_security:8.0r4.1</product> <product>pulse_secure_security:8.0r5.0</product> <product>pulse_secure_security:8.0r6.0</product> <product>pulse_secure_security:8.0r7.0</product> <product>pulse_secure_security:8.0r7.1</product> <product>pulse_secure_security:8.0r8.0</product> <product>pulse_secure_security:8.0r8.1</product> <product>pulse_secure_security:8.0r9.0</product> <product>pulse_secure_security:8.0r10.0</product> <product>pulse_secure_security:8.0r11.0</product> <product>pulse_secure_security:8.0r12.1</product> <product>pulse_secure_security:8.0r13.0</product> <product>pulse_secure_security:8.0r13.1</product> <product>pulse_secure_security:8.0r14.0</product> <product>pulse_secure_security:8.0r15.0</product> <product>pulse_secure_security:8.1r1.0</product> <product>pulse_secure_security:8.1r1.1</product> <product>pulse_secure_security:8.1r2.0</product> <product>pulse_secure_security:8.1r2.1</product> <product>pulse_secure_security:8.1r3.0</product> <product>pulse_secure_security:8.1r3.1</product> <product>pulse_secure_security:8.1r3.2</product> <product>pulse_secure_security:8.1r4.0</product> <product>pulse_secure_security:8.1r4.1</product> <product>pulse_secure_security:8.1r5.0</product> <product>pulse_secure_security:8.1r6.0</product> <product>pulse_secure_security:8.1r7.0</product> <product>pulse_secure_security:8.1r8.0</product> <product>pulse_secure_security:8.1r9.0</product> <product>pulse_secure_security:8.2r1.0</product> <product>pulse_secure_security:8.2r1.1</product> <product>pulse_secure_security:8.2r2.0</product> <product>standalone_pulse_installer_service:7.4r1.0</product> <product>standalone_pulse_installer_service:7.4r2.0</product> <product>standalone_pulse_installer_service:7.4r3.0</product> <product>standalone_pulse_installer_service:7.4r4.0</product> <product>standalone_pulse_installer_service:7.4r5.0</product> <product>standalone_pulse_installer_service:7.4r6.0</product> <product>standalone_pulse_installer_service:7.4r7.0</product> <product>standalone_pulse_installer_service:7.4r8.0</product> <product>standalone_pulse_installer_service:7.4r9.0</product> <product>standalone_pulse_installer_service:7.4r9.1</product> <product>standalone_pulse_installer_service:7.4r9.2</product> <product>standalone_pulse_installer_service:7.4r9.3</product> <product>standalone_pulse_installer_service:7.4r10.0</product> <product>standalone_pulse_installer_service:7.4r11.0</product> <product>standalone_pulse_installer_service:7.4r11.1</product> <product>standalone_pulse_installer_service:7.4r12.0</product> <product>standalone_pulse_installer_service:7.4r13.0</product> <product>standalone_pulse_installer_service:7.4r13.1</product> <product>standalone_pulse_installer_service:7.4r13.2</product> <product>standalone_pulse_installer_service:7.4r13.3</product> <product>standalone_pulse_installer_service:7.4r13.4</product> <product>standalone_pulse_installer_service:7.4r13.5</product> <product>standalone_pulse_installer_service:7.4r13.6</product> <product>standalone_pulse_installer_service:8.0r1.0</product> <product>standalone_pulse_installer_service:8.0r1.1</product> <product>standalone_pulse_installer_service:8.0r2.0</product> <product>standalone_pulse_installer_service:8.0r3.0</product> <product>standalone_pulse_installer_service:8.0r3.1</product> <product>standalone_pulse_installer_service:8.0r3.2</product> <product>standalone_pulse_installer_service:8.0r4.0</product> <product>standalone_pulse_installer_service:8.0r4.1</product> <product>standalone_pulse_installer_service:8.0r5.0</product> <product>standalone_pulse_installer_service:8.0r6.0</product> <product>standalone_pulse_installer_service:8.0r7.0</product> <product>standalone_pulse_installer_service:8.0r7.1</product> <product>standalone_pulse_installer_service:8.0r8.0</product> <product>standalone_pulse_installer_service:8.0r8.1</product> <product>standalone_pulse_installer_service:8.0r9.0</product> <product>standalone_pulse_installer_service:8.0r10.0</product> <product>standalone_pulse_installer_service:8.0r11.0</product> <product>standalone_pulse_installer_service:8.0r12.1</product> <product>standalone_pulse_installer_service:8.0r13.0</product> <product>standalone_pulse_installer_service:8.0r13.1</product> <product>standalone_pulse_installer_service:8.0r14.0</product> <product>standalone_pulse_installer_service:8.0r15.0</product> <product>standalone_pulse_installer_service:8.1r1.0</product> <product>standalone_pulse_installer_service:8.1r1.1</product> <product>standalone_pulse_installer_service:8.1r2.0</product> <product>standalone_pulse_installer_service:8.1r2.1</product> <product>standalone_pulse_installer_service:8.1r3.0</product> <product>standalone_pulse_installer_service:8.1r3.1</product> <product>standalone_pulse_installer_service:8.1r3.2</product> <product>standalone_pulse_installer_service:8.1r4.0</product> <product>standalone_pulse_installer_service:8.1r4.1</product> <product>standalone_pulse_installer_service:8.1r5.0</product> <product>standalone_pulse_installer_service:8.1r6.0</product> <product>standalone_pulse_installer_service:8.1r7.0</product> <product>standalone_pulse_installer_service:8.1r8.0</product> <product>standalone_pulse_installer_service:8.1r9.0</product> <product>standalone_pulse_installer_service:8.2r1.0</product> <product>standalone_pulse_installer_service:8.2r1.1</product> <product>standalone_pulse_installer_service:8.2r2.0</product> </cve> <cve id="CVE-2016-9242" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9247" level="MEDIUM"> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> </cve> <cve id="CVE-2016-9245" level="MEDIUM"> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> </cve> <cve id="CVE-2016-9244" level="LOW"> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-1474" level="MEDIUM"> <product>prime_infrastructure:2.2%282%29</product> </cve> <cve id="CVE-2016-1476" level="MEDIUM"> <product>ip_phone_8800_series_firmware:11.0_base</product> </cve> <cve id="CVE-2016-1477" level="LOW"> <product>connected_streaming_analytics:1.1.1_base</product> </cve> <cve id="CVE-2016-1470" level="MEDIUM"> <product>small_business_220_series_smart_plus_switches:1.0.0.17</product> <product>small_business_220_series_smart_plus_switches:1.0.0.18</product> <product>small_business_220_series_smart_plus_switches:1.0.0.19</product> </cve> <cve id="CVE-2016-1471" level="MEDIUM"> <product>small_business_220_series_smart_plus_switches:1.0.0.17</product> <product>small_business_220_series_smart_plus_switches:1.0.0.18</product> <product>small_business_220_series_smart_plus_switches:1.0.0.19</product> </cve> <cve id="CVE-2016-1472" level="LOW"> <product>small_business_220_series_smart_plus_switches:1.0.0.17</product> <product>small_business_220_series_smart_plus_switches:1.0.0.18</product> <product>small_business_220_series_smart_plus_switches:1.0.0.19</product> </cve> <cve id="CVE-2016-1473" level="LOW"> <product>small_business_220_series_smart_plus_switches:1.0.0.17</product> <product>small_business_220_series_smart_plus_switches:1.0.0.18</product> <product>small_business_220_series_smart_plus_switches:1.0.0.19</product> </cve> <cve id="CVE-2016-4118" level="LOW"> <product>connect:9.5.2</product> </cve> <cve id="CVE-2016-1479" level="LOW"> <product>ip_phone_8800_series_firmware:11.0%281%29</product> </cve> <cve id="CVE-2016-7887" level="LOW"> <product>coldfusion_builder:3.0.2</product> <product>coldfusion_builder:2016</product> </cve> <cve id="CVE-2016-7886" level="LOW"> <product>indesign:11.4.1</product> <product>indesign_server:11.0.0</product> </cve> <cve id="CVE-2016-7885" level="MEDIUM"> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-0364" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1.0</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1.0</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> </cve> <cve id="CVE-2016-7882" level="MEDIUM"> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-1000118" level="LOW"> <product>slideshow:1.0.4</product> </cve> <cve id="CVE-2016-1000119" level="LOW"> <product>catalog:1.0.4</product> </cve> <cve id="CVE-2016-1000116" level="LOW"> <product>portfolio_gallery_manager:1.1.5</product> </cve> <cve id="CVE-2016-1000117" level="LOW"> <product>slideshow:1.0.4</product> </cve> <cve id="CVE-2016-1000114" level="MEDIUM"> <product>huge-it_image_gallery:1.1.5</product> </cve> <cve id="CVE-2016-1000115" level="LOW"> <product>portfolio_gallery_manager:1.1.0</product> </cve> <cve id="CVE-2016-1000112" level="LOW"> <product>contus-video-comments:1.0</product> </cve> <cve id="CVE-2016-1000113" level="LOW"> <product>huge-it_image_gallery:1.1.5</product> </cve> <cve id="CVE-2016-7777" level="MEDIUM"> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-7889" level="LOW"> <product>digital_editions:4.5.2</product> </cve> <cve id="CVE-2016-5571" level="LOW"> <product>applications_dba:12.1.3</product> <product>applications_dba:12.2.3</product> <product>applications_dba:12.2.4</product> <product>applications_dba:12.2.5</product> <product>applications_dba:12.2.6</product> </cve> <cve id="CVE-2016-5570" level="LOW"> <product>applications_dba:12.2.3</product> <product>applications_dba:12.2.4</product> <product>applications_dba:12.2.5</product> <product>applications_dba:12.2.6</product> </cve> <cve id="CVE-2016-5573" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5572" level="MEDIUM"> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-5575" level="LOW"> <product>common_applications:12.1.1</product> <product>common_applications:12.1.2</product> <product>common_applications:12.1.3</product> <product>common_applications:12.2.3</product> <product>common_applications:12.2.4</product> <product>common_applications:12.2.5</product> <product>common_applications:12.2.6</product> </cve> <cve id="CVE-2016-5574" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-5577" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-5579" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-5578" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-0918" level="LOW"> <product>rsa_identity_management_and_governance:6.8.1</product> <product>rsa_identity_management_and_governance:6.9.0</product> <product>rsa_identity_management_and_governance:6.9.1</product> <product>rsa_via_lifecycle_and_governance:7.0.0</product> </cve> <cve id="CVE-2016-0919" level="MEDIUM"> <product>rsa_web_threat_detection:5.0</product> <product>rsa_web_threat_detection:5.1</product> <product>rsa_web_threat_detection:5.1.2</product> </cve> <cve id="CVE-2016-1225" level="LOW"> <product>internet_security:8.0</product> <product>internet_security:10.0</product> </cve> <cve id="CVE-2016-0910" level="LOW"> <product>data_domain_os:5.5.3.3</product> <product>data_domain_os:5.6.1.0</product> <product>data_domain_os:5.7.1.0</product> </cve> <cve id="CVE-2016-0911" level="LOW"> <product>data_domain:5.7.1.0</product> </cve> <cve id="CVE-2016-0912" level="LOW"> <product>data_domain:5.7.1.0</product> </cve> <cve id="CVE-2016-0913" level="LOW"> <product>networker_module_for_microsoft_applications:3.0</product> <product>networker_module_for_microsoft_applications:3.0.1</product> <product>networker_module_for_microsoft_applications:8.2.3.6</product> <product>replication_manager:5.5.3</product> </cve> <cve id="CVE-2016-0914" level="LOW"> <product>documentum_administrator:7.0</product> <product>documentum_administrator:7.1</product> <product>documentum_administrator:7.2</product> <product>documentum_capital_projects:1.9</product> <product>documentum_capital_projects:1.10</product> <product>documentum_taskspace:6.7</product> <product>documentum_webtop:6.8</product> <product>documentum_webtop:6.8.1</product> </cve> <cve id="CVE-2016-0915" level="LOW"> <product>authentication_manager_prime_self-service:3.0</product> <product>authentication_manager_prime_self-service:3.1</product> </cve> <cve id="CVE-2016-0916" level="LOW"> <product>networker:8.2.1.8</product> <product>networker:8.2.2.5</product> <product>networker:9.0.0.5</product> </cve> <cve id="CVE-2016-0917" level="LOW"> <product>vnx1_oe_firmware:-</product> <product>vnx2_oe_firmware:-</product> <product>vnxe_oe_firmware:-</product> </cve> <cve id="CVE-2016-1227" level="LOW"> <product>pr-400mi_firmware:07.00.1006</product> <product>rt-400mi_firmware:07.00.1006</product> <product>rv-440mi_firmware:07.00.1006</product> <product>pr-400mi_firmware:07.00.1005</product> <product>rt-400mi_firmware:07.00.1005</product> <product>rv-440mi_firmware:07.00.1005</product> </cve> <cve id="CVE-2016-1226" level="MEDIUM"> <product>internet_security:8.0</product> <product>internet_security:10.0</product> </cve> <cve id="CVE-2016-6875" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6874" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6877" level="HIGH"> <product>xenmobile_server:10.3.6.310</product> </cve> <cve id="CVE-2016-6876" level="LOW"> <product>big-ip_access_policy_manager:10.2.1</product> <product>big-ip_access_policy_manager:10.2.2</product> <product>big-ip_access_policy_manager:10.2.3</product> <product>big-ip_access_policy_manager:10.2.4</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:10.2.1</product> <product>big-ip_application_security_manager:10.2.2</product> <product>big-ip_application_security_manager:10.2.3</product> <product>big-ip_application_security_manager:10.2.4</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:10.2.1</product> <product>big-ip_edge_gateway:10.2.2</product> <product>big-ip_edge_gateway:10.2.3</product> <product>big-ip_edge_gateway:10.2.4</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:10.2.1</product> <product>big-ip_global_traffic_manager:10.2.2</product> <product>big-ip_global_traffic_manager:10.2.3</product> <product>big-ip_global_traffic_manager:10.2.4</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:10.2.1</product> <product>big-ip_link_controller:10.2.2</product> <product>big-ip_link_controller:10.2.3</product> <product>big-ip_link_controller:10.2.4</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:10.2.1</product> <product>big-ip_local_traffic_manager:10.2.2</product> <product>big-ip_local_traffic_manager:10.2.3</product> <product>big-ip_local_traffic_manager:10.2.4</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:10.2.1</product> <product>big-ip_wan_optimization_manager:10.2.2</product> <product>big-ip_wan_optimization_manager:10.2.3</product> <product>big-ip_wan_optimization_manager:10.2.4</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_webaccelerator:10.2.1</product> <product>big-ip_webaccelerator:10.2.2</product> <product>big-ip_webaccelerator:10.2.3</product> <product>big-ip_webaccelerator:10.2.4</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_protocol_security_manager:10.2.1</product> <product>big-ip_protocol_security_manager:10.2.2</product> <product>big-ip_protocol_security_manager:10.2.3</product> <product>big-ip_protocol_security_manager:10.2.4</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-6871" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6870" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6873" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6872" level="LOW"> <product>hhvm:3.14.5</product> </cve> <cve id="CVE-2016-6879" level="LOW"> <product>botan:1.11.0</product> <product>botan:1.11.1</product> <product>botan:1.11.2</product> <product>botan:1.11.3</product> <product>botan:1.11.4</product> <product>botan:1.11.5</product> <product>botan:1.11.6</product> <product>botan:1.11.7</product> <product>botan:1.11.8</product> <product>botan:1.11.9</product> <product>botan:1.11.10</product> <product>botan:1.11.11</product> <product>botan:1.11.12</product> <product>botan:1.11.13</product> <product>botan:1.11.14</product> <product>botan:1.11.15</product> <product>botan:1.11.16</product> <product>botan:1.11.17</product> <product>botan:1.11.18</product> <product>botan:1.11.19</product> <product>botan:1.11.20</product> <product>botan:1.11.21</product> <product>botan:1.11.22</product> <product>botan:1.11.23</product> <product>botan:1.11.24</product> <product>botan:1.11.25</product> <product>botan:1.11.26</product> <product>botan:1.11.27</product> <product>botan:1.11.28</product> <product>botan:1.11.29</product> <product>botan:1.11.30</product> </cve> <cve id="CVE-2016-6878" level="LOW"> <product>botan:1.11.30</product> </cve> <cve id="CVE-2016-6444" level="MEDIUM"> <product>meeting_server:1.8.15</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9.0</product> <product>meeting_server:1.9.2</product> <product>meeting_server:2.0.0</product> <product>meeting_server:2.0.1</product> <product>meeting_server:2.0.3</product> <product>meeting_server:2.0.4</product> <product>meeting_server:2.0.5</product> </cve> <cve id="CVE-2016-3623" level="LOW"> <product>libtiff:4.0.6</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3330" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-3621" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3620" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3625" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3624" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-3628" level="LOW"> <product>enterprise_message_service:8.2.2</product> <product>enterprise_message_service_appliance_firmware:2.3.1</product> </cve> <cve id="CVE-2016-5955" level="MEDIUM"> <product>rational_doors_next_generation:6.0.2</product> </cve> <cve id="CVE-2016-7832" level="LOW"> <product>dezie:8.0.2</product> <product>dezie:8.0.3</product> <product>dezie:8.0.4</product> <product>dezie:8.0.5</product> <product>dezie:8.0.6</product> <product>dezie:8.0.7</product> <product>dezie:8.1.0</product> <product>dezie:8.1.1</product> </cve> <cve id="CVE-2016-7833" level="LOW"> <product>dezie:8.0.2</product> <product>dezie:8.0.3</product> <product>dezie:8.0.4</product> <product>dezie:8.0.5</product> <product>dezie:8.0.6</product> <product>dezie:8.0.7</product> <product>dezie:8.1.0</product> <product>dezie:8.1.1</product> </cve> <cve id="CVE-2016-7830" level="LOW"> <product>pcs-xc1_firmware:1.21</product> <product>pcs-xg100_firmware:1.42</product> <product>pcs-xg100_firmware:1.50</product> <product>pcs-xg77_firmware:1.42</product> <product>pcs-xg77_firmware:1.50</product> </cve> <cve id="CVE-2016-7831" level="MEDIUM"> <product>sleipnir:4.5.3</product> <product>sleipnir:4.5.3</product> </cve> <cve id="CVE-2016-7836" level="LOW"> <product>skysea_client_view:11.221.03</product> </cve> <cve id="CVE-2016-9479" level="LOW"> <product>b2evolution:6.7.8</product> </cve> <cve id="CVE-2016-7834" level="LOW"> <product>snc_series_firmware:1.8.5.00</product> <product>snc_series_firmware:2.7.0</product> </cve> <cve id="CVE-2016-7835" level="LOW"> <product>h2o:2.0.4</product> <product>h2o:2.1.0</product> </cve> <cve id="CVE-2016-7838" level="MEDIUM"> <product>winsparkle:0.5.2</product> </cve> <cve id="CVE-2016-7839" level="MEDIUM"> <product>olive_blog:-</product> </cve> <cve id="CVE-2016-9470" level="MEDIUM"> <product>revive_adserver:3.2.4</product> <product>revive_adserver:4.0.0</product> </cve> <cve id="CVE-2016-9471" level="HIGH"> <product>revive_adserver:3.2.4</product> <product>revive_adserver:4.0.0</product> </cve> <cve id="CVE-2016-9472" level="MEDIUM"> <product>revive_adserver:3.2.4</product> <product>revive_adserver:4.0.0</product> </cve> <cve id="CVE-2016-9473" level="MEDIUM"> <product>browser:1.2.17</product> <product>browser:1.9.56</product> </cve> <cve id="CVE-2016-5748" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-5749" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-8309" level="LOW"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-8308" level="MEDIUM"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-5968" level="LOW"> <product>tealeaf_customer_experience:8.6</product> <product>tealeaf_customer_experience:8.7</product> <product>tealeaf_customer_experience:8.8</product> <product>tealeaf_customer_experience:9.0.0</product> <product>tealeaf_customer_experience:9.0.0a</product> <product>tealeaf_customer_experience:9.0.1</product> <product>tealeaf_customer_experience:9.0.1a</product> <product>tealeaf_customer_experience:9.0.2</product> <product>tealeaf_customer_experience:9.0.2a</product> </cve> <cve id="CVE-2016-8305" level="MEDIUM"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-8304" level="MEDIUM"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5964" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> </cve> <cve id="CVE-2016-8306" level="LOW"> <product>flexcube_investor_servicing:12.0.1</product> <product>flexcube_investor_servicing:12.0.2</product> <product>flexcube_investor_servicing:12.0.4</product> <product>flexcube_investor_servicing:12.1.0</product> <product>flexcube_investor_servicing:12.3.0</product> </cve> <cve id="CVE-2016-5746" level="HIGH"> <product>libstorage:-</product> <product>libstorage-ng:-</product> <product>yast-storage:-</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-8300" level="MEDIUM"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-8303" level="MEDIUM"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-8302" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-10459" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10458" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_427_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sdm630_firmware:-</product> <product>sdm636_firmware:-</product> <product>sdm660_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-6426" level="MEDIUM"> <product>unified_contact_center_express:10.0%281%29</product> <product>unified_contact_center_express:10.5%281%29</product> <product>unified_contact_center_express:10.6%281%29</product> <product>unified_contact_center_express:11.0%281%29</product> <product>unified_intelligence_center:8.5.4</product> <product>unified_intelligence_center:9.0%282%29</product> <product>unified_intelligence_center:9.1%281%29</product> </cve> <cve id="CVE-2016-10455" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10454" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> </cve> <cve id="CVE-2016-10457" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10456" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10451" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10450" level="LOW"> <product>fsm9055_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10452" level="LOW"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-6427" level="MEDIUM"> <product>unified_contact_center_express:10.0%281%29</product> <product>unified_contact_center_express:10.5%281%29</product> <product>unified_contact_center_express:10.6%281%29</product> <product>unified_contact_center_express:11.0%281%29</product> <product>unified_intelligence_center:8.5.4</product> <product>unified_intelligence_center:9.0%282%29</product> <product>unified_intelligence_center:9.1%281%29</product> </cve> <cve id="CVE-2016-1089" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-1088" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1085" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1084" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1087" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1086" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1081" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4560" level="LOW"> <product>installanywhere:-</product> </cve> <cve id="CVE-2016-4563" level="MEDIUM"> <product>imagemagick:6.9.3-0</product> <product>imagemagick:7.0.0-0</product> <product>imagemagick:7.0.1-0</product> <product>imagemagick:7.0.1-1</product> </cve> <cve id="CVE-2016-4562" level="MEDIUM"> <product>imagemagick:6.9.3-0</product> <product>imagemagick:7.0.0-0</product> <product>imagemagick:7.0.1-0</product> <product>imagemagick:7.0.1-1</product> </cve> <cve id="CVE-2016-6424" level="LOW"> <product>adaptive_security_appliance_software:8.4.7.29</product> <product>adaptive_security_appliance_software:9.1.7.4</product> </cve> <cve id="CVE-2016-2214" level="MEDIUM"> <product>agile_controller-campus:v100r001c00spc315</product> </cve> <cve id="CVE-2016-2217" level="LOW"> <product>socat:1.7.3.0</product> <product>socat:2.0.0</product> </cve> <cve id="CVE-2016-2216" level="MEDIUM"> <product>node.js:0.10.0</product> <product>node.js:0.10.1</product> <product>node.js:0.10.2</product> <product>node.js:0.10.3</product> <product>node.js:0.10.4</product> <product>node.js:0.10.5</product> <product>node.js:0.10.6</product> <product>node.js:0.10.7</product> <product>node.js:0.10.8</product> <product>node.js:0.10.9</product> <product>node.js:0.10.10</product> <product>node.js:0.10.11</product> <product>node.js:0.10.12</product> <product>node.js:0.10.13</product> <product>node.js:0.10.14</product> <product>node.js:0.10.15</product> <product>node.js:0.10.16</product> <product>node.js:0.10.16-isaacs-manual</product> <product>node.js:0.10.17</product> <product>node.js:0.10.18</product> <product>node.js:0.10.19</product> <product>node.js:0.10.20</product> <product>node.js:0.10.21</product> <product>node.js:0.10.22</product> <product>node.js:0.10.23</product> <product>node.js:0.10.24</product> <product>node.js:0.10.25</product> <product>node.js:0.10.26</product> <product>node.js:0.10.27</product> <product>node.js:0.10.28</product> <product>node.js:0.10.29</product> <product>node.js:0.10.30</product> <product>node.js:0.10.31</product> <product>node.js:0.10.32</product> <product>node.js:0.10.33</product> <product>node.js:0.10.34</product> <product>node.js:0.10.35</product> <product>node.js:0.10.36</product> <product>node.js:0.10.37</product> <product>node.js:0.10.38</product> <product>node.js:0.10.39</product> <product>node.js:0.10.40</product> <product>node.js:0.10.41</product> <product>node.js:0.11.6</product> <product>node.js:0.11.7</product> <product>node.js:0.11.8</product> <product>node.js:0.11.9</product> <product>node.js:0.11.10</product> <product>node.js:0.11.11</product> <product>node.js:0.11.12</product> <product>node.js:0.11.13</product> <product>node.js:0.11.14</product> <product>node.js:0.11.15</product> <product>node.js:0.11.16</product> <product>node.js:0.12.0</product> <product>node.js:0.12.1</product> <product>node.js:0.12.2</product> <product>node.js:0.12.3</product> <product>node.js:0.12.4</product> <product>node.js:0.12.5</product> <product>node.js:0.12.6</product> <product>node.js:0.12.7</product> <product>node.js:0.12.8</product> <product>node.js:0.12.9</product> <product>node.js:4.0.0</product> <product>node.js:4.1.0</product> <product>node.js:4.1.1</product> <product>node.js:4.1.2</product> <product>node.js:4.2.0</product> <product>node.js:4.2.1</product> <product>node.js:4.2.2</product> <product>node.js:4.2.3</product> <product>node.js:4.2.4</product> <product>node.js:4.2.5</product> <product>node.js:4.2.6</product> <product>node.js:5.0.0</product> <product>node.js:5.1.0</product> <product>node.js:5.1.1</product> <product>node.js:5.2.0</product> <product>node.js:5.3.0</product> <product>node.js:5.4.0</product> <product>node.js:5.4.1</product> <product>node.js:5.5.0</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2211" level="MEDIUM"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-2210" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-2212" level="LOW"> <product>magento:1.9.2.2</product> <product>magento:1.14.2.2</product> </cve> <cve id="CVE-2016-2219" level="MEDIUM"> <product>pan-os:7.0</product> <product>pan-os:7.0.1</product> <product>pan-os:7.0.2</product> <product>pan-os:7.0.3</product> <product>pan-os:7.0.4</product> <product>pan-os:7.0.5</product> <product>pan-os:7.0.6</product> <product>pan-os:7.0.7</product> </cve> <cve id="CVE-2016-6471" level="LOW"> <product>firesight_system_software:5.4.1.6</product> </cve> <cve id="CVE-2016-6470" level="LOW"> <product>hybrid_media_service:1.0_base</product> </cve> <cve id="CVE-2016-6472" level="MEDIUM"> <product>unified_communications_manager:11.5%281.2%29</product> </cve> <cve id="CVE-2016-6468" level="MEDIUM"> <product>emergency_responder:11.5%281.10000.4%29</product> </cve> <cve id="CVE-2016-3109" level="LOW"> <product>shopware:5.1.4</product> </cve> <cve id="CVE-2016-3102" level="LOW"> <product>script_security:1.0</product> <product>script_security:1.1</product> <product>script_security:1.2</product> <product>script_security:1.3</product> <product>script_security:1.4</product> <product>script_security:1.5</product> <product>script_security:1.6</product> <product>script_security:1.7</product> <product>script_security:1.8</product> <product>script_security:1.9</product> <product>script_security:1.10</product> <product>script_security:1.11</product> <product>script_security:1.12</product> <product>script_security:1.13</product> <product>script_security:1.14</product> <product>script_security:1.15</product> <product>script_security:1.16</product> <product>script_security:1.17</product> <product>script_security:1.18</product> </cve> <cve id="CVE-2016-6463" level="LOW"> <product>email_security_appliance_firmware:9.7.0-125</product> <product>email_security_appliance_firmware:9.7.1-06</product> <product>email_security_appliance_firmware:10.0.0-082</product> </cve> <cve id="CVE-2016-6460" level="LOW"> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.1.1</product> <product>firesight_system_software:5.4.1.6</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.1.0</product> <product>firesight_system_software:6.2.0</product> </cve> <cve id="CVE-2016-3116" level="LOW"> <product>dropbear_ssh:2015.71</product> </cve> <cve id="CVE-2016-3106" level="LOW"> <product>pulp:2.8.2-1</product> </cve> <cve id="CVE-2016-6467" level="LOW"> <product>asr_5000_series_software:20.0.0</product> <product>asr_5000_series_software:21.0.0</product> <product>asr_5000_series_software:21.0.m0.64702</product> </cve> <cve id="CVE-2016-3104" level="LOW"> <product>mongodb:2.4.0</product> <product>mongodb:2.6.0</product> </cve> <cve id="CVE-2016-4061" level="LOW"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-0107" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0454" level="LOW"> <product>e-business_suite:12.1</product> <product>e-business_suite:12.2</product> </cve> <cve id="CVE-2016-7489" level="LOW"> <product>virtual_machine:15.10</product> </cve> <cve id="CVE-2016-7488" level="LOW"> <product>virtual_machine:15.10</product> </cve> <cve id="CVE-2016-0451" level="LOW"> <product>goldengate:11.2</product> <product>goldengate:12.1.2</product> </cve> <cve id="CVE-2016-4062" level="MEDIUM"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-0453" level="HIGH"> <product>fusion_middleware:3.1.2</product> </cve> <cve id="CVE-2016-0452" level="LOW"> <product>goldengate:11.2</product> <product>goldengate:12.1.2</product> </cve> <cve id="CVE-2016-4063" level="MEDIUM"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-0459" level="LOW"> <product>e-business_suite:11.5.10.2</product> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-0109" level="HIGH"> <product>edge</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0108" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-4820" level="MEDIUM"> <product>etx-r_firmware:-</product> </cve> <cve id="CVE-2016-4821" level="LOW"> <product>etx-r_firmware:-</product> </cve> <cve id="CVE-2016-4822" level="LOW"> <product>cg-wlbargnl_firmware:-</product> </cve> <cve id="CVE-2016-4823" level="LOW"> <product>cg-wlbaragm_firmware:-</product> </cve> <cve id="CVE-2016-4824" level="LOW"> <product>cg-wlr300gnv-w_firmware:-</product> <product>cg-wlr300gnv_firmware:-</product> </cve> <cve id="CVE-2016-4825" level="MEDIUM"> <product>e-commerce:1.8.2</product> </cve> <cve id="CVE-2016-4826" level="MEDIUM"> <product>e-commerce:1.8.2</product> </cve> <cve id="CVE-2016-4827" level="MEDIUM"> <product>e-commerce:1.8.2</product> </cve> <cve id="CVE-2016-4828" level="LOW"> <product>e-commerce:1.8.2</product> </cve> <cve id="CVE-2016-4829" level="MEDIUM"> <product>ppv_play_player:1.2.0</product> <product>ppv_play_player:2.1.2</product> </cve> <cve id="CVE-2016-7150" level="MEDIUM"> <product>b2evolution:6.7.5</product> </cve> <cve id="CVE-2016-7155" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-7154" level="LOW"> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> </cve> <cve id="CVE-2016-7157" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-7156" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-10600" level="MEDIUM"> <product>webrtc-native:1.4.0</product> </cve> <cve id="CVE-2016-10601" level="MEDIUM"> <product>webdrvr:2.43.0-1</product> </cve> <cve id="CVE-2016-10602" level="MEDIUM"> <product>haxe:5.0.10</product> </cve> <cve id="CVE-2016-10603" level="MEDIUM"> <product>air-sdk:16.0.0-272-16</product> </cve> <cve id="CVE-2016-10604" level="MEDIUM"> <product>dalekjs:0.0.11</product> </cve> <cve id="CVE-2016-10605" level="MEDIUM"> <product>dalekjs:0.0.5</product> </cve> <cve id="CVE-2016-10606" level="MEDIUM"> <product>grunt-webdriver-qunit:0.2.6</product> </cve> <cve id="CVE-2016-10607" level="MEDIUM"> <product>openframe-glslviewer:0.2.7</product> </cve> <cve id="CVE-2016-10608" level="MEDIUM"> <product>robot-js:2.0.0</product> </cve> <cve id="CVE-2016-8688" level="MEDIUM"> <product>libarchive:3.2.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-8689" level="LOW"> <product>libarchive:3.2.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-8680" level="MEDIUM"> <product>libdwarf:20161001</product> </cve> <cve id="CVE-2016-8681" level="MEDIUM"> <product>libdwarf:20161001</product> </cve> <cve id="CVE-2016-8685" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8686" level="MEDIUM"> <product>potrace:1.12</product> </cve> <cve id="CVE-2016-8687" level="LOW"> <product>libarchive:3.2.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-1276" level="MEDIUM"> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.3x48</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-4357" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-1274" level="LOW"> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> </cve> <cve id="CVE-2016-1275" level="LOW"> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> </cve> <cve id="CVE-2016-4352" level="MEDIUM"> <product>libavformat:57.34.103</product> </cve> <cve id="CVE-2016-1273" level="MEDIUM"> <product>junos:13.2x51</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x53</product> </cve> <cve id="CVE-2016-1270" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.2</product> </cve> <cve id="CVE-2016-1271" level="LOW"> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-1278" level="MEDIUM"> <product>junos:12.1x46</product> </cve> <cve id="CVE-2016-1279" level="LOW"> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-9221" level="LOW"> <product>aironet_access_point_software:8.2%28121.12%29</product> <product>aironet_access_point_software:8.4%281.82%29</product> </cve> <cve id="CVE-2016-9220" level="LOW"> <product>aironet_access_point_software:8.2%28130.0%29</product> </cve> <cve id="CVE-2016-9223" level="LOW"> <product>cloudcenter_orchestrator:4.4.0</product> <product>cloudcenter_orchestrator:4.5.0</product> <product>cloudcenter_orchestrator:4.6.0</product> <product>cloudcenter_orchestrator:4.6.1</product> </cve> <cve id="CVE-2016-9222" level="MEDIUM"> <product>netflow_generation_appliance:1.0%282%29</product> </cve> <cve id="CVE-2016-9225" level="LOW"> <product>asa_cx_context-aware_security_software:9.0.1</product> <product>asa_cx_context-aware_security_software:9.0.1-40</product> <product>asa_cx_context-aware_security_software:9.0.2</product> <product>asa_cx_context-aware_security_software:9.0.2-68</product> <product>asa_cx_context-aware_security_software:9.0_base</product> <product>asa_cx_context-aware_security_software:9.1.2-29</product> <product>asa_cx_context-aware_security_software:9.1.2-42</product> <product>asa_cx_context-aware_security_software:9.1.3-8</product> <product>asa_cx_context-aware_security_software:9.1.3-10</product> <product>asa_cx_context-aware_security_software:9.1.3-13</product> <product>asa_cx_context-aware_security_software:9.2.1-1</product> <product>asa_cx_context-aware_security_software:9.2.2-1</product> <product>asa_cx_context-aware_security_software:9.3%281.1.112%29</product> <product>asa_cx_context-aware_security_software:9.3.1-1</product> <product>asa_cx_context-aware_security_software:9.3.2-1</product> <product>asa_cx_context-aware_security_software:9.3.3.1-13</product> <product>asa_cx_context-aware_security_software:9.3.4-1</product> <product>asa_cx_context-aware_security_software:9.3.4-2</product> <product>asa_cx_context-aware_security_software:9.3.4-3</product> <product>asa_cx_context-aware_security_software:9.3.4-4</product> <product>asa_cx_context-aware_security_software:9.3.4-5</product> <product>asa_cx_context-aware_security_software:9.3.4-6</product> <product>asa_cx_context-aware_security_software:9.3.4.1.11</product> <product>asa_cx_context-aware_security_software:9.3_base</product> </cve> <cve id="CVE-2016-9224" level="LOW"> <product>jabber_guest:10.0.0</product> <product>jabber_guest:10.0.2</product> <product>jabber_guest:10.5.0</product> <product>jabber_guest:10.6.8</product> <product>jabber_guest:10.6.9</product> </cve> <cve id="CVE-2016-1413" level="LOW"> <product>firepower_management_center:5.4.0</product> <product>firepower_management_center:5.4.0.2</product> <product>firepower_management_center:5.4.1</product> <product>firepower_management_center:5.4.1.1</product> <product>firepower_management_center:5.4.1.2</product> <product>firepower_management_center:5.4.1.3</product> <product>firepower_management_center:5.4.1.4</product> <product>firepower_management_center:5.4.1.5</product> <product>firepower_management_center:5.4.1.6</product> <product>firepower_management_center:6.0.0.1</product> </cve> <cve id="CVE-2016-1410" level="LOW"> <product>webex_meeting_center:-</product> </cve> <cve id="CVE-2016-1411" level="MEDIUM"> <product>content_security_management_appliance:9.1.0</product> <product>content_security_management_appliance:9.1.0-004</product> <product>content_security_management_appliance:9.1.0-031</product> <product>content_security_management_appliance:9.1.0-033</product> <product>content_security_management_appliance:9.1.0-103</product> <product>content_security_management_appliance:9.6.0</product> <product>email_security_appliance:7.5.2-201</product> <product>email_security_appliance:7.5.2-hp2-303</product> <product>email_security_appliance:7.6.3-025</product> <product>email_security_appliance:8.0.1-023</product> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.1-021</product> <product>web_security_appliance:7.7.0-608</product> <product>web_security_appliance:7.7.5-835</product> <product>web_security_appliance:8.8.0-000</product> </cve> <cve id="CVE-2016-1416" level="LOW"> <product>prime_collaboration_provisioning:10.6.2</product> </cve> <cve id="CVE-2016-1417" level="MEDIUM"> <product>snort:2.9.7.0</product> </cve> <cve id="CVE-2016-1415" level="MEDIUM"> <product>webex_wrf_player_t29:sp10_base</product> </cve> <cve id="CVE-2016-1418" level="LOW"> <product>aironet_access_point_software_:8.2_%28100.0%29</product> </cve> <cve id="CVE-2016-1419" level="LOW"> <product>aironet_access_point_software:8.2%28102.43%29</product> </cve> <cve id="CVE-2016-5889" level="MEDIUM"> <product>interact:8.6</product> <product>interact:9.0</product> <product>interact:9.1</product> <product>interact:9.1.1</product> <product>interact:9.1.2</product> <product>interact:10.0</product> </cve> <cve id="CVE-2016-5888" level="MEDIUM"> <product>interact:8.6</product> <product>interact:9.0</product> <product>interact:9.1</product> <product>interact:9.1.1</product> <product>interact:9.1.2</product> <product>interact:10.0</product> </cve> <cve id="CVE-2016-5881" level="MEDIUM"> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-5880" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-5883" level="MEDIUM"> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-5882" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-5884" level="MEDIUM"> <product>domino:8.5.1.0</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.1.5</product> <product>domino:8.5.2.0</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.2.4</product> <product>domino:8.5.3.0</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:8.5.3.6</product> <product>domino:9.0.0.0</product> <product>domino:9.0.1.0</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> <product>domino:9.0.1.6</product> <product>inotes:8.5.1.0</product> <product>inotes:8.5.1.1</product> <product>inotes:8.5.1.2</product> <product>inotes:8.5.1.3</product> <product>inotes:8.5.1.4</product> <product>inotes:8.5.1.5</product> <product>inotes:8.5.2.0</product> <product>inotes:8.5.2.1</product> <product>inotes:8.5.2.2</product> <product>inotes:8.5.2.3</product> <product>inotes:8.5.3.0</product> <product>inotes:8.5.3.1</product> <product>inotes:8.5.3.2</product> <product>inotes:8.5.3.3</product> <product>inotes:8.5.3.4</product> <product>inotes:8.5.3.5</product> <product>inotes:8.5.3.6</product> <product>inotes:9.0.0.0</product> <product>inotes:9.0.1.0</product> <product>inotes:9.0.1.1</product> <product>inotes:9.0.1.2</product> <product>inotes:9.0.1.3</product> <product>inotes:9.0.1.4</product> <product>inotes:9.0.1.5</product> <product>inotes:9.0.1.6</product> </cve> <cve id="CVE-2016-5081" level="LOW"> <product>zp-ibh-13w:-</product> <product>zp-ne-14-s:-</product> </cve> <cve id="CVE-2016-5080" level="LOW"> <product>asn1c:7.0.1</product> </cve> <cve id="CVE-2016-5085" level="LOW"> <product>onetouch_ping_firmware:-</product> </cve> <cve id="CVE-2016-5084" level="LOW"> <product>onetouch_ping_firmware:-</product> </cve> <cve id="CVE-2016-5087" level="LOW"> <product>alertus_desktop_notification_for_os_x:2.9.30.1700</product> </cve> <cve id="CVE-2016-5086" level="MEDIUM"> <product>onetouch_ping_firmware:-</product> </cve> <cve id="CVE-2016-0222" level="LOW"> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> <product>maximo_for_government:-</product> <product>maximo_for_life_sciences:-</product> <product>maximo_for_nuclear_power:-</product> <product>maximo_for_oil_and_gas:-</product> <product>maximo_for_transportation:-</product> <product>maximo_for_utilities:-</product> <product>smartcloud_control_desk:-</product> </cve> <cve id="CVE-2016-5229" level="LOW"> <product>bamboo:5.11.3</product> <product>bamboo:5.12.0</product> <product>bamboo:5.12.1</product> <product>bamboo:5.12.2</product> </cve> <cve id="CVE-2016-5228" level="LOW"> <product>rumba:9.4</product> </cve> <cve id="CVE-2016-5558" level="LOW"> <product>outside_in_technology:8.4.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> <product>outside_in_technology:8.5.3</product> </cve> <cve id="CVE-2016-5557" level="MEDIUM"> <product>advanced_pricing:12.1.1</product> <product>advanced_pricing:12.1.2</product> <product>advanced_pricing:12.1.3</product> <product>advanced_pricing:12.2.3</product> <product>advanced_pricing:12.2.4</product> <product>advanced_pricing:12.2.5</product> <product>advanced_pricing:12.2.6</product> </cve> <cve id="CVE-2016-5556" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5554" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5552" level="LOW"> <product>jdk:1.6</product> <product>jdk:1.7</product> <product>jdk:1.8</product> <product>jdk:1.8</product> <product>jre:1.6</product> <product>jre:1.7</product> <product>jre:1.8</product> <product>jre:1.8</product> <product>jrockit:r28.3.12</product> </cve> <cve id="CVE-2016-0223" level="MEDIUM"> <product>forms_server:4.0.0.0</product> <product>forms_server:8.0.0.0</product> <product>forms_server:8.0.1.0</product> <product>forms_server:8.1.0.0</product> <product>forms_server:8.2.0.0</product> </cve> <cve id="CVE-2016-2028" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2029" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2026" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2027" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2024" level="LOW"> <product>insight_contol:7.5</product> <product>server_migration_package:7.5</product> </cve> <cve id="CVE-2016-2025" level="LOW"> <product>service_manager:9.30</product> <product>service_manager:9.31</product> <product>service_manager:9.32</product> <product>service_manager:9.33</product> <product>service_manager:9.34</product> <product>service_manager:9.35</product> <product>service_manager:9.40</product> <product>service_manager:9.41</product> </cve> <cve id="CVE-2016-2022" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2023" level="LOW"> <product>restful_interface_tool:1.40</product> </cve> <cve id="CVE-2016-2020" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-2021" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-6853" level="MEDIUM"> <product>ox_guard:2.4.2</product> </cve> <cve id="CVE-2016-6852" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6851" level="MEDIUM"> <product>ox_guard:2.4.2</product> </cve> <cve id="CVE-2016-6850" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-6857" level="MEDIUM"> <product>hybris:5.2.0.12</product> <product>hybris:5.3.0.10</product> <product>hybris:5.4.0.10</product> <product>hybris:5.5.0.9</product> <product>hybris:5.5.1.10</product> <product>hybris:5.6.0.10</product> <product>hybris:5.7.0.14</product> <product>hybris:6.0</product> </cve> <cve id="CVE-2016-6856" level="MEDIUM"> <product>hybris:5.6.0.10</product> </cve> <cve id="CVE-2016-6854" level="MEDIUM"> <product>ox_guard:2.4.2</product> </cve> <cve id="CVE-2016-6859" level="LOW"> <product>hybris</product> </cve> <cve id="CVE-2016-6858" level="MEDIUM"> <product>hybris:5.0.4.10</product> <product>hybris:5.1.0.10</product> <product>hybris:5.1.1.11</product> <product>hybris:5.2.0.13</product> <product>hybris:5.3.0.9</product> <product>hybris:5.5.0.8</product> <product>hybris:5.5.1.9</product> <product>hybris:5.6.0.7</product> <product>hybris:5.7.0.8</product> <product>hybris:6.0</product> </cve> <cve id="CVE-2016-3649" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-3648" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-6149" level="LOW"> <product>hana_sps09:1.00.091.00.14186593</product> </cve> <cve id="CVE-2016-6148" level="LOW"> <product>hana:1.00.73.00.389160</product> </cve> <cve id="CVE-2016-10142" level="LOW"> <product>ipv6:-</product> </cve> <cve id="CVE-2016-6145" level="LOW"> <product>hana_db:1.00.091.00.1418659308</product> </cve> <cve id="CVE-2016-6144" level="MEDIUM"> <product>hana:1.00.73.00.389160</product> </cve> <cve id="CVE-2016-3643" level="LOW"> <product>virtualization_manager:6.3.1</product> </cve> <cve id="CVE-2016-6146" level="LOW"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-3645" level="LOW"> <product>advanced_threat_protection:2.0.3</product> <product>csapi:10.0.4</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.0</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.5</product> <product>data_center_security_server:6.6</product> <product>data_center_security_server:6.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>message_gateway:10.6.1-3</product> <product>message_gateway_for_service_providers:10.5</product> <product>message_gateway_for_service_providers:10.6</product> <product>ngc:22.6</product> <product>norton_360</product> <product>norton_antivirus</product> <product>norton_bootable_removal_tool:2016.0</product> <product>norton_internet_security</product> <product>norton_power_eraser:5.0</product> <product>norton_security</product> <product>norton_security:13.0.1</product> <product>norton_security_with_backup</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.03</product> <product>protection_for_sharepoint_servers:6.04</product> <product>protection_for_sharepoint_servers:6.05</product> <product>protection_for_sharepoint_servers:6.06</product> </cve> <cve id="CVE-2016-6140" level="HIGH"> <product>trex:7.10</product> </cve> <cve id="CVE-2016-6143" level="LOW"> <product>hana:1.00.73.00.389160</product> </cve> <cve id="CVE-2016-6142" level="LOW"> <product>hana:1.00.73.00.389160</product> </cve> <cve id="CVE-2016-10140" level="LOW"> <product>zoneminder:1.30.0</product> </cve> <cve id="CVE-2016-10146" level="LOW"> <product>imagemagick</product> </cve> <cve id="CVE-2016-10145" level="LOW"> <product>imagemagick</product> </cve> <cve id="CVE-2016-10632" level="MEDIUM"> <product>apk-parser2:0.1.1</product> </cve> <cve id="CVE-2016-5971" level="LOW"> <product>security_privileged_identity_manager_virtual_appliance:2.0.2</product> </cve> <cve id="CVE-2016-7818" level="MEDIUM"> <product>device_data_encryption_program:1.00</product> <product>specification_check_program:9.00</product> <product>todokesho_creation_program:15.00</product> <product>todokesho_print_program:5.00</product> </cve> <cve id="CVE-2016-7819" level="LOW"> <product>ts-wrla_firmware:1.01.02</product> <product>ts-wrlp_firmware:1.01.02</product> </cve> <cve id="CVE-2016-7810" level="MEDIUM"> <product>cg-wlr300nx_firmware:1.20</product> </cve> <cve id="CVE-2016-7811" level="LOW"> <product>cg-wlr300nx_firmware:1.20</product> </cve> <cve id="CVE-2016-7812" level="MEDIUM"> <product>mitsubishi_ufj:5.2.2</product> <product>mitsubishi_ufj:5.3.1</product> </cve> <cve id="CVE-2016-7813" level="MEDIUM"> <product>deraemon-cms:0.8.9</product> </cve> <cve id="CVE-2016-7814" level="LOW"> <product>ts-wrla_firmware:1.00.01</product> <product>ts-wrlp_firmware:1.00.01</product> </cve> <cve id="CVE-2016-7815" level="MEDIUM"> <product>remote_service_manager:3.0.0</product> <product>remote_service_manager:3.0.1</product> <product>remote_service_manager:3.1.0</product> <product>remote_service_manager:3.1.1</product> <product>remote_service_manager:3.1.2</product> <product>remote_service_manager:3.1.3</product> <product>remote_service_manager:3.1.4</product> </cve> <cve id="CVE-2016-7816" level="MEDIUM"> <product>kintone:1.0.6</product> </cve> <cve id="CVE-2016-7817" level="MEDIUM"> <product>simple_keitai_chat:2.0</product> </cve> <cve id="CVE-2016-9418" level="LOW"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9419" level="MEDIUM"> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9412" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9413" level="MEDIUM"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9410" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9411" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9416" level="LOW"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9417" level="MEDIUM"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-9414" level="LOW"> <product>merge_system:1.8.6</product> <product>mybb:1.8.6</product> </cve> <cve id="CVE-2016-9415" level="LOW"> <product>merge_system:1.8.7</product> <product>mybb:1.8.7</product> </cve> <cve id="CVE-2016-5944" level="MEDIUM"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.10.1</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.1</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2</product> <product>tivoli_storage_productivity_center:5.2.3</product> <product>tivoli_storage_productivity_center:5.2.4</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.5</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6</product> <product>tivoli_storage_productivity_center:5.2.7</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-5945" level="LOW"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.10.1</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.1</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2</product> <product>tivoli_storage_productivity_center:5.2.3</product> <product>tivoli_storage_productivity_center:5.2.4</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.5</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6</product> <product>tivoli_storage_productivity_center:5.2.7</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-5946" level="LOW"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.10.1</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.1</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2</product> <product>tivoli_storage_productivity_center:5.2.3</product> <product>tivoli_storage_productivity_center:5.2.4</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.5</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6</product> <product>tivoli_storage_productivity_center:5.2.7</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-8328" level="MEDIUM"> <product>jdk:1.8</product> <product>jre:1.8</product> </cve> <cve id="CVE-2016-5940" level="MEDIUM"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-5941" level="MEDIUM"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-5942" level="MEDIUM"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-5767" level="MEDIUM"> <product>libgd:2.0.33</product> </cve> <cve id="CVE-2016-8323" level="LOW"> <product>flexcube_core_banking:5.1.0</product> <product>flexcube_core_banking:5.2.0</product> <product>flexcube_core_banking:11.5.0</product> </cve> <cve id="CVE-2016-8322" level="LOW"> <product>flexcube_core_banking:5.1.0</product> <product>flexcube_core_banking:5.2.0</product> <product>flexcube_core_banking:11.5.0</product> </cve> <cve id="CVE-2016-8320" level="MEDIUM"> <product>flexcube_enterprise_limits_and_collateral_management:12.0.0</product> <product>flexcube_enterprise_limits_and_collateral_management:12.0.2</product> </cve> <cve id="CVE-2016-5948" level="MEDIUM"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-5949" level="LOW"> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> </cve> <cve id="CVE-2016-8325" level="LOW"> <product>one-to-one_fulfillment:12.1.1</product> <product>one-to-one_fulfillment:12.1.2</product> <product>one-to-one_fulfillment:12.1.3</product> <product>one-to-one_fulfillment:12.2.3</product> <product>one-to-one_fulfillment:12.2.4</product> <product>one-to-one_fulfillment:12.2.5</product> <product>one-to-one_fulfillment:12.2.6</product> </cve> <cve id="CVE-2016-8324" level="LOW"> <product>flexcube_core_banking:5.1.0</product> <product>flexcube_core_banking:5.2.0</product> <product>flexcube_core_banking:11.5.0</product> </cve> <cve id="CVE-2016-3468" level="LOW"> <product>agile_engineering_data_management:6.1.3.0</product> <product>agile_engineering_data_management:6.2.0.0</product> </cve> <cve id="CVE-2016-7206" level="MEDIUM"> <product>edge</product> </cve> <cve id="CVE-2016-10477" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10476" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10475" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10474" level="LOW"> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10473" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10472" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10471" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10479" level="LOW"> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10478" level="LOW"> <product>sd_617_firmware:-</product> </cve> <cve id="CVE-2016-1117" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-6461" level="MEDIUM"> <product>adaptive_security_appliance_software:9.1.6.10</product> <product>adaptive_security_appliance_software:9.1.7.4</product> <product>adaptive_security_appliance_software:9.1.7.7</product> <product>adaptive_security_appliance_software:9.1.7.9</product> <product>adaptive_security_appliance_software:9.1.7.11</product> <product>adaptive_security_appliance_software:9.1.7.12</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.2.4.4</product> <product>adaptive_security_appliance_software:9.2.4.8</product> <product>adaptive_security_appliance_software:9.2.4.10</product> <product>adaptive_security_appliance_software:9.2.4.13</product> <product>adaptive_security_appliance_software:9.2.4.14</product> <product>adaptive_security_appliance_software:9.2.4.16</product> <product>adaptive_security_appliance_software:9.2.4.17</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.3.3.9</product> <product>adaptive_security_appliance_software:9.3.3.10</product> <product>adaptive_security_appliance_software:9.3.3.11</product> <product>adaptive_security_appliance_software:9.3.5</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.4.2</product> <product>adaptive_security_appliance_software:9.4.2.3</product> <product>adaptive_security_appliance_software:9.4.3</product> <product>adaptive_security_appliance_software:9.4.3.3</product> <product>adaptive_security_appliance_software:9.4.3.4</product> <product>adaptive_security_appliance_software:9.4.3.6</product> <product>adaptive_security_appliance_software:9.4.3.8</product> <product>adaptive_security_appliance_software:9.4.3.11</product> <product>adaptive_security_appliance_software:9.4.3.12</product> <product>adaptive_security_appliance_software:9.4.4</product> <product>adaptive_security_appliance_software:9.5.1</product> <product>adaptive_security_appliance_software:9.5.2</product> <product>adaptive_security_appliance_software:9.5.2.6</product> <product>adaptive_security_appliance_software:9.5.2.10</product> <product>adaptive_security_appliance_software:9.5.2.14</product> </cve> <cve id="CVE-2016-4547" level="LOW"> <product>samsung_mobile:4.4</product> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> </cve> <cve id="CVE-2016-4546" level="LOW"> <product>samsung_mobile:4.4</product> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> </cve> <cve id="CVE-2016-4545" level="LOW"> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> </cve> <cve id="CVE-2016-4341" level="LOW"> <product>clustered_data_ontap:8.3.2</product> </cve> <cve id="CVE-2016-4340" level="LOW"> <product>gitlab:8.2.0</product> <product>gitlab:8.2.1</product> <product>gitlab:8.2.2</product> <product>gitlab:8.2.3</product> <product>gitlab:8.2.4</product> <product>gitlab:8.3.0</product> <product>gitlab:8.3.1</product> <product>gitlab:8.3.2</product> <product>gitlab:8.3.3</product> <product>gitlab:8.3.4</product> <product>gitlab:8.3.5</product> <product>gitlab:8.3.6</product> <product>gitlab:8.3.7</product> <product>gitlab:8.3.8</product> <product>gitlab:8.4.0</product> <product>gitlab:8.4.1</product> <product>gitlab:8.4.2</product> <product>gitlab:8.4.3</product> <product>gitlab:8.4.4</product> <product>gitlab:8.4.5</product> <product>gitlab:8.4.6</product> <product>gitlab:8.4.7</product> <product>gitlab:8.4.8</product> <product>gitlab:8.4.9</product> <product>gitlab:8.5.0</product> <product>gitlab:8.5.1</product> <product>gitlab:8.5.2</product> <product>gitlab:8.5.3</product> <product>gitlab:8.5.4</product> <product>gitlab:8.5.5</product> <product>gitlab:8.5.6</product> <product>gitlab:8.5.7</product> <product>gitlab:8.5.8</product> <product>gitlab:8.5.9</product> <product>gitlab:8.5.10</product> <product>gitlab:8.5.11</product> <product>gitlab:8.6.0</product> <product>gitlab:8.6.1</product> <product>gitlab:8.6.2</product> <product>gitlab:8.6.3</product> <product>gitlab:8.6.4</product> <product>gitlab:8.6.5</product> <product>gitlab:8.6.6</product> <product>gitlab:8.6.7</product> <product>gitlab:8.7.0</product> </cve> <cve id="CVE-2016-2233" level="LOW"> <product>hexchat:2.10.2</product> </cve> <cve id="CVE-2016-2232" level="LOW"> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.0</product> <product>asterisk:1.8.1</product> <product>asterisk:1.8.1</product> <product>asterisk:1.8.1.1</product> <product>asterisk:1.8.1.2</product> <product>asterisk:1.8.2</product> <product>asterisk:1.8.2.1</product> <product>asterisk:1.8.2.2</product> <product>asterisk:1.8.2.3</product> <product>asterisk:1.8.2.4</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3</product> <product>asterisk:1.8.3.1</product> <product>asterisk:1.8.3.2</product> <product>asterisk:1.8.3.3</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4</product> <product>asterisk:1.8.4.1</product> <product>asterisk:1.8.4.2</product> <product>asterisk:1.8.4.3</product> <product>asterisk:1.8.4.4</product> <product>asterisk:1.8.5</product> <product>asterisk:1.8.5</product> <product>asterisk:1.8.5.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.6.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.0</product> <product>asterisk:1.8.7.1</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.0</product> <product>asterisk:1.8.8.1</product> <product>asterisk:1.8.8.2</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.0</product> <product>asterisk:1.8.9.1</product> <product>asterisk:1.8.9.2</product> <product>asterisk:1.8.9.3</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.0</product> <product>asterisk:1.8.10.1</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.0</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.11.1</product> <product>asterisk:1.8.12</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.0</product> <product>asterisk:1.8.12.1</product> <product>asterisk:1.8.12.2</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.0</product> <product>asterisk:1.8.13.1</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.0</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.14.1</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.0</product> <product>asterisk:1.8.15.1</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.16.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.17.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.0</product> <product>asterisk:1.8.18.1</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.0</product> <product>asterisk:1.8.19.1</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.0</product> <product>asterisk:1.8.20.1</product> <product>asterisk:1.8.20.1</product> <product>asterisk:1.8.20.2</product> <product>asterisk:1.8.20.2</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.21.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.22.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.0</product> <product>asterisk:1.8.23.1</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.0</product> <product>asterisk:1.8.24.1</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.25.0</product> <product>asterisk:1.8.26.0</product> <product>asterisk:1.8.26.0</product> <product>asterisk:1.8.26.1</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.27.0</product> <product>asterisk:1.8.28.0</product> <product>asterisk:1.8.28.0</product> <product>asterisk:1.8.28.1</product> <product>asterisk:1.8.28.2</product> <product>asterisk:1.8.32.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.0</product> <product>asterisk:11.0.1</product> <product>asterisk:11.0.2</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.0</product> <product>asterisk:11.1.1</product> <product>asterisk:11.1.2</product> <product>asterisk:11.2.0</product> <product>asterisk:11.4.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.6.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.7.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.0</product> <product>asterisk:11.8.1</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.9.0</product> <product>asterisk:11.10.0</product> <product>asterisk:11.10.0</product> <product>asterisk:11.10.1</product> <product>asterisk:11.10.1</product> <product>asterisk:11.11.0</product> <product>asterisk:11.11.0</product> <product>asterisk:11.12.0</product> <product>asterisk:11.12.0</product> <product>asterisk:11.13.0</product> <product>asterisk:11.13.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.14.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.15.0</product> <product>asterisk:11.16.0</product> <product>asterisk:11.16.0</product> <product>asterisk:11.17.0</product> <product>asterisk:11.18.0</product> <product>asterisk:11.18.0</product> <product>asterisk:11.19.0</product> <product>asterisk:11.20.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:11.21.0</product> <product>asterisk:12.0.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.0</product> <product>asterisk:12.1.1</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.2.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.0</product> <product>asterisk:12.3.1</product> <product>asterisk:12.3.2</product> <product>asterisk:12.4.0</product> <product>asterisk:12.4.0</product> <product>asterisk:12.5.0</product> <product>asterisk:12.5.0</product> <product>asterisk:12.6.0</product> <product>asterisk:12.6.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.0</product> <product>asterisk:12.7.1</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.0</product> <product>asterisk:12.8.1</product> <product>asterisk:12.8.2</product> <product>asterisk:13.0.0</product> <product>asterisk:13.0.1</product> <product>asterisk:13.1.0</product> <product>asterisk:13.1.0</product> <product>asterisk:13.1.0</product> <product>asterisk:13.2.0</product> <product>asterisk:13.2.0</product> <product>asterisk:13.3.0</product> <product>asterisk:13.4.0</product> <product>asterisk:13.4.0</product> <product>asterisk:13.5.0</product> <product>asterisk:13.5.0</product> <product>asterisk:13.6.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>asterisk:13.7.0</product> <product>certified_asterisk:1.8.28</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:11.6.0</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1</product> <product>certified_asterisk:13.1.0</product> <product>certified_asterisk:13.1.0</product> <product>certified_asterisk:13.1.0</product> </cve> <cve id="CVE-2016-2231" level="LOW"> <product>mt882_firmware:v200r002b022</product> </cve> <cve id="CVE-2016-2230" level="LOW"> <product>openelec</product> </cve> <cve id="CVE-2016-4349" level="LOW"> <product>webex_productivity_tools:2.40.5001.10012</product> </cve> <cve id="CVE-2016-7837" level="LOW"> <product>bluez:5.41</product> </cve> <cve id="CVE-2016-3476" level="LOW"> <product>knowledge:8.5</product> </cve> <cve id="CVE-2016-6485" level="LOW"> <product>magento2:-</product> </cve> <cve id="CVE-2016-6486" level="LOW"> <product>sinema_server:-</product> </cve> <cve id="CVE-2016-3475" level="LOW"> <product>knowledge:8.5</product> </cve> <cve id="CVE-2016-3472" level="MEDIUM"> <product>siebel_engineering-installer_and_deployment:8.1.1</product> <product>siebel_engineering-installer_and_deployment:8.2.2</product> <product>siebel_engineering-installer_and_deployment:2014</product> <product>siebel_engineering-installer_and_deployment:2015</product> <product>siebel_engineering-installer_and_deployment:2016</product> </cve> <cve id="CVE-2016-3473" level="LOW"> <product>business_intelligence_publisher:11.1.1.7.0</product> <product>business_intelligence_publisher:11.1.1.9.0</product> <product>business_intelligence_publisher:12.2.1.0.0</product> </cve> <cve id="CVE-2016-3470" level="LOW"> <product>transportation_management:6.4.1</product> </cve> <cve id="CVE-2016-6483" level="LOW"> <product>vbulletin:3.8.7</product> <product>vbulletin:3.8.8</product> <product>vbulletin:3.8.9</product> <product>vbulletin:4.2.2</product> <product>vbulletin:4.2.3</product> <product>vbulletin:5.2.0</product> <product>vbulletin:5.2.1</product> <product>vbulletin:5.2.2</product> </cve> <cve id="CVE-2016-0899" level="MEDIUM"> <product>rsa_archer_egrc:5.5</product> <product>rsa_archer_egrc:5.5</product> <product>rsa_archer_egrc:5.5.1</product> <product>rsa_archer_egrc:5.5.1.3</product> <product>rsa_archer_egrc:5.5.2.3</product> </cve> <cve id="CVE-2016-3478" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0895" level="MEDIUM"> <product>rsa_data_loss_prevention:9.6</product> <product>rsa_data_loss_prevention:9.6.1</product> <product>rsa_data_loss_prevention:9.6.2</product> <product>rsa_data_loss_prevention:9.6.2.1</product> <product>rsa_data_loss_prevention:9.6.2.2</product> <product>rsa_data_loss_prevention:9.6.2.3</product> <product>rsa_data_loss_prevention:9.6.2.4</product> </cve> <cve id="CVE-2016-0894" level="LOW"> <product>rsa_data_loss_prevention:9.6</product> <product>rsa_data_loss_prevention:9.6.1</product> <product>rsa_data_loss_prevention:9.6.2</product> <product>rsa_data_loss_prevention:9.6.2.1</product> <product>rsa_data_loss_prevention:9.6.2.2</product> <product>rsa_data_loss_prevention:9.6.2.3</product> <product>rsa_data_loss_prevention:9.6.2.4</product> </cve> <cve id="CVE-2016-0897" level="LOW"> <product>operations_manager:1.6.16</product> <product>operations_manager:1.7.0</product> <product>operations_manager:1.7.1</product> <product>operations_manager:1.7.2</product> <product>operations_manager:1.7.3</product> <product>operations_manager:1.7.4</product> <product>operations_manager:1.7.5</product> <product>operations_manager:1.7.6</product> <product>operations_manager:1.7.7</product> </cve> <cve id="CVE-2016-0896" level="LOW"> <product>cloud_foundry_elastic_runtime:1.6.33</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> </cve> <cve id="CVE-2016-0891" level="MEDIUM"> <product>vipr_srm:3.6.4</product> </cve> <cve id="CVE-2016-0890" level="MEDIUM"> <product>powerpath_virtual_appliance:2.0</product> <product>powerpath_virtual_appliance:2.0</product> </cve> <cve id="CVE-2016-0893" level="LOW"> <product>rsa_data_loss_prevention:9.6</product> <product>rsa_data_loss_prevention:9.6.1</product> <product>rsa_data_loss_prevention:9.6.2</product> <product>rsa_data_loss_prevention:9.6.2.1</product> <product>rsa_data_loss_prevention:9.6.2.2</product> <product>rsa_data_loss_prevention:9.6.2.3</product> <product>rsa_data_loss_prevention:9.6.2.4</product> </cve> <cve id="CVE-2016-0892" level="MEDIUM"> <product>rsa_data_loss_prevention:9.6</product> <product>rsa_data_loss_prevention:9.6.1</product> <product>rsa_data_loss_prevention:9.6.2</product> <product>rsa_data_loss_prevention:9.6.2.1</product> <product>rsa_data_loss_prevention:9.6.2.2</product> <product>rsa_data_loss_prevention:9.6.2.3</product> <product>rsa_data_loss_prevention:9.6.2.4</product> </cve> <cve id="CVE-2016-6440" level="MEDIUM"> <product>unified_communications_manager:11.5%280.99838.4%29</product> </cve> <cve id="CVE-2016-6337" level="LOW"> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-6334" level="MEDIUM"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-6335" level="LOW"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-3124" level="LOW"> <product>simplesamlphp:1.14</product> </cve> <cve id="CVE-2016-6333" level="MEDIUM"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-6446" level="LOW"> <product>meeting_server:1.8.15</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9.0</product> <product>meeting_server:1.9.2</product> <product>meeting_server:2.0.0</product> <product>meeting_server:2.0.1</product> <product>meeting_server:2.0.3</product> <product>meeting_server:2.0.4</product> <product>meeting_server:2.0.5</product> </cve> <cve id="CVE-2016-6447" level="LOW"> <product>meeting_app:1.8.0</product> <product>meeting_app:1.9.0</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9.0</product> <product>meeting_server:2.0.0</product> </cve> <cve id="CVE-2016-3128" level="LOW"> <product>enterprise_service:12.0.0</product> <product>enterprise_service:12.0.1</product> <product>enterprise_service:12.1.0</product> <product>enterprise_service:12.2.0</product> <product>enterprise_service:12.2.1</product> <product>enterprise_service:12.3.0</product> <product>enterprise_service:12.3.1</product> <product>enterprise_service:12.4.0</product> <product>enterprise_service:12.4.1</product> <product>enterprise_service:12.5.0a</product> <product>enterprise_service:12.5.1</product> <product>enterprise_service:12.5.2</product> </cve> <cve id="CVE-2016-3129" level="MEDIUM"> <product>good_enterprise_mobility_server:2.2.22.25</product> </cve> <cve id="CVE-2016-7001" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6338" level="LOW"> <product>enterprise_virtualization:4.0</product> </cve> <cve id="CVE-2016-0473" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0471" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> </cve> <cve id="CVE-2016-0470" level="LOW"> <product>fusion_middleware:11.1.1.7.0</product> <product>fusion_middleware:11.1.1.9</product> <product>fusion_middleware:12.2.1</product> </cve> <cve id="CVE-2016-0477" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-0476" level="LOW"> <product>enterprise_manager_grid_control:12.4.0.2</product> <product>enterprise_manager_grid_control:12.5.0.2</product> </cve> <cve id="CVE-2016-0475" level="MEDIUM"> <product>jdk:1.8.0</product> <product>jre:1.8.0</product> <product>jrockit:r28.3.8</product> </cve> <cve id="CVE-2016-0474" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0479" level="MEDIUM"> <product>business_intelligence:11.1.1.7.0</product> <product>business_intelligence:11.1.1.9.0</product> <product>business_intelligence:12.2.1.0.0</product> </cve> <cve id="CVE-2016-0478" level="LOW"> <product>application_testing_suite:12.4.0.2</product> <product>application_testing_suite:12.5.0.2</product> </cve> <cve id="CVE-2016-1905" level="LOW"> <product>kubernetes:-</product> </cve> <cve id="CVE-2016-1906" level="LOW"> <product>kubernetes:-</product> </cve> <cve id="CVE-2016-5742" level="LOW"> <product>movable_type:6.0</product> <product>movable_type:6.0</product> <product>movable_type:6.0.1</product> <product>movable_type:6.0.1</product> <product>movable_type:6.0.2</product> <product>movable_type:6.0.2</product> <product>movable_type:6.0.3</product> <product>movable_type:6.0.3</product> <product>movable_type:6.0.4</product> <product>movable_type:6.0.4</product> <product>movable_type:6.0.5</product> <product>movable_type:6.0.5</product> <product>movable_type:6.0.6</product> <product>movable_type:6.0.6</product> <product>movable_type:6.0.7</product> <product>movable_type:6.0.7</product> <product>movable_type:6.0.8</product> <product>movable_type:6.0.8</product> <product>movable_type:6.1.0</product> <product>movable_type:6.1.0</product> <product>movable_type:6.1.1</product> <product>movable_type:6.1.1</product> <product>movable_type:6.1.2</product> <product>movable_type:6.1.2</product> <product>movable_type:6.2.0</product> <product>movable_type:6.2.0</product> <product>movable_type:6.2.2</product> <product>movable_type:6.2.2</product> <product>movable_type:6.2.4</product> <product>movable_type:6.2.4</product> <product>movable_type_open_source:5.2.13</product> </cve> <cve id="CVE-2016-1907" level="LOW"> <product>openssh:6.8</product> <product>openssh:6.8</product> <product>openssh:6.9</product> <product>openssh:6.9</product> <product>openssh:7.0</product> <product>openssh:7.0</product> <product>openssh:7.1</product> <product>openssh:7.1</product> </cve> <cve id="CVE-2016-5967" level="LOW"> <product>rational_asset_analyzer:6.1.0</product> <product>rational_asset_analyzer:6.1.0.1</product> <product>rational_asset_analyzer:6.1.0.2</product> <product>rational_asset_analyzer:6.1.0.3</product> <product>rational_asset_analyzer:6.1.0.4</product> <product>rational_asset_analyzer:6.1.0.5</product> <product>rational_asset_analyzer:6.1.0.6</product> <product>rational_asset_analyzer:6.1.0.7</product> <product>rational_asset_analyzer:6.1.0.8</product> <product>rational_asset_analyzer:6.1.0.9</product> </cve> <cve id="CVE-2016-5740" level="MEDIUM"> <product>open-xchange_appsuite:7.8.2</product> </cve> <cve id="CVE-2016-8301" level="MEDIUM"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5747" level="LOW"> <product>edirectory:9.0</product> </cve> <cve id="CVE-2016-6000" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.4.2.4</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> <product>tririga_application_platform:3.5.1.0</product> <product>tririga_application_platform:3.5.1.1</product> </cve> <cve id="CVE-2016-10668" level="MEDIUM"> <product>libsbml:0.0.2</product> </cve> <cve id="CVE-2016-10669" level="MEDIUM"> <product>soci:0.0.1</product> </cve> <cve id="CVE-2016-5960" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-6001" level="MEDIUM"> <product>forms_experience_builder:8.5</product> <product>forms_experience_builder:8.5.1</product> <product>forms_experience_builder:8.6.0</product> </cve> <cve id="CVE-2016-10662" level="MEDIUM"> <product>tomita:-</product> </cve> <cve id="CVE-2016-10663" level="MEDIUM"> <product>wixtoolset:-</product> </cve> <cve id="CVE-2016-10660" level="MEDIUM"> <product>fis-parser-sass-bin:-</product> </cve> <cve id="CVE-2016-5745" level="LOW"> <product>big-ip_local_traffic_manager:11.0.0</product> <product>big-ip_local_traffic_manager:11.1.0</product> <product>big-ip_local_traffic_manager:11.2.0</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.3.0</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> </cve> <cve id="CVE-2016-10666" level="MEDIUM"> <product>tomita-parser:0.0.3</product> </cve> <cve id="CVE-2016-10667" level="MEDIUM"> <product>selenium-portal:0.0.1-2</product> </cve> <cve id="CVE-2016-10664" level="MEDIUM"> <product>mystem:-</product> </cve> <cve id="CVE-2016-10665" level="MEDIUM"> <product>herbivore:0.0.3</product> </cve> <cve id="CVE-2016-3071" level="LOW"> <product>libreswan:3.16</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3077" level="LOW"> <product>ovirt:-</product> </cve> <cve id="CVE-2016-8667" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8661" level="LOW"> <product>little_snitch:3.0</product> <product>little_snitch:3.0.1</product> <product>little_snitch:3.0.2</product> <product>little_snitch:3.0.3</product> <product>little_snitch:3.0.4</product> <product>little_snitch:3.1</product> <product>little_snitch:3.1.1</product> <product>little_snitch:3.3</product> <product>little_snitch:3.3.1</product> <product>little_snitch:3.3.2</product> <product>little_snitch:3.3.3</product> <product>little_snitch:3.3.4</product> <product>little_snitch:3.4</product> <product>little_snitch:3.4.1</product> <product>little_snitch:3.4.2</product> <product>little_snitch:3.5</product> <product>little_snitch:3.5.1</product> <product>little_snitch:3.5.2</product> <product>little_snitch:3.5.3</product> <product>little_snitch:3.6</product> <product>little_snitch:3.6.1</product> </cve> <cve id="CVE-2016-4165" level="LOW"> <product>brackets:1.6</product> </cve> <cve id="CVE-2016-8668" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-4164" level="MEDIUM"> <product>brackets:1.6</product> </cve> <cve id="CVE-2016-7977" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-1258" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> </cve> <cve id="CVE-2016-4379" level="MEDIUM"> <product>integrated_lights-out_3_firmware:1.87</product> </cve> <cve id="CVE-2016-0524" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-4374" level="LOW"> <product>release_control:9.13</product> <product>release_control:9.20</product> <product>release_control:9.21</product> </cve> <cve id="CVE-2016-4375" level="LOW"> <product>integrated_lights-out_3_firmware:1.87</product> <product>integrated_lights-out_4_firmware:2.43</product> <product>integrated_lights-out_4_mrca_firmware:2.31</product> </cve> <cve id="CVE-2016-4376" level="LOW"> <product>fabric_os:7.4.1</product> <product>fabric_os:8.0.0</product> </cve> <cve id="CVE-2016-1257" level="MEDIUM"> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x51</product> <product>junos:14.1x51</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-4370" level="LOW"> <product>project_and_portfolio_management_center:9.20</product> <product>project_and_portfolio_management_center:9.21</product> <product>project_and_portfolio_management_center:9.22</product> <product>project_and_portfolio_management_center:9.30</product> <product>project_and_portfolio_management_center:9.31</product> <product>project_and_portfolio_management_center:9.32</product> </cve> <cve id="CVE-2016-4371" level="MEDIUM"> <product>service_manager:9.30</product> <product>service_manager:9.31</product> <product>service_manager:9.32</product> <product>service_manager:9.33</product> <product>service_manager:9.34</product> <product>service_manager:9.35</product> <product>service_manager:9.40</product> <product>service_manager:9.41</product> <product>service_manager_mobility:9.30</product> <product>service_manager_mobility:9.31</product> <product>service_manager_mobility:9.32</product> <product>service_manager_mobility:9.33</product> <product>service_manager_mobility:9.34</product> <product>service_manager_mobility:9.35</product> <product>service_manager_mobility:9.40</product> <product>service_manager_mobility:9.41</product> <product>service_manager_server:9.30</product> <product>service_manager_server:9.31</product> <product>service_manager_server:9.32</product> <product>service_manager_server:9.33</product> <product>service_manager_server:9.34</product> <product>service_manager_server:9.35</product> <product>service_manager_server:9.40</product> <product>service_manager_server:9.41</product> <product>service_manager_service_request_catalog:9.30</product> <product>service_manager_service_request_catalog:9.31</product> <product>service_manager_service_request_catalog:9.32</product> <product>service_manager_service_request_catalog:9.33</product> <product>service_manager_service_request_catalog:9.34</product> <product>service_manager_service_request_catalog:9.35</product> <product>service_manager_service_request_catalog:9.40</product> <product>service_manager_service_request_catalog:9.41</product> <product>service_manager_web_client:9.30</product> <product>service_manager_web_client:9.31</product> <product>service_manager_web_client:9.32</product> <product>service_manager_web_client:9.33</product> <product>service_manager_web_client:9.34</product> <product>service_manager_web_client:9.35</product> <product>service_manager_web_client:9.40</product> <product>service_manager_web_client:9.41</product> <product>service_manager_windows_client:9.30</product> <product>service_manager_windows_client:9.31</product> <product>service_manager_windows_client:9.32</product> <product>service_manager_windows_client:9.33</product> <product>service_manager_windows_client:9.34</product> <product>service_manager_windows_client:9.35</product> <product>service_manager_windows_client:9.40</product> <product>service_manager_windows_client:9.41</product> </cve> <cve id="CVE-2016-1252" level="MEDIUM"> <product>apt:0.7.21</product> <product>apt:0.7.22</product> <product>apt:0.7.22.1</product> <product>apt:0.7.23</product> <product>apt:0.7.23.1</product> <product>apt:0.7.24</product> <product>apt:0.7.24ubuntu1</product> <product>apt:0.7.25</product> <product>apt:0.7.25.1</product> <product>apt:0.7.25.3</product> <product>apt:0.7.25.3ubuntu1</product> <product>apt:0.7.25.3ubuntu2</product> <product>apt:0.7.25.3ubuntu3</product> <product>apt:0.7.25.3ubuntu4</product> <product>apt:0.7.25.3ubuntu5</product> <product>apt:0.7.25.3ubuntu6</product> <product>apt:0.7.25.3ubuntu7</product> <product>apt:0.7.25.3ubuntu8</product> <product>apt:0.7.25ubuntu1</product> <product>apt:0.8.0</product> <product>apt:0.8.1</product> <product>apt:0.8.2</product> <product>apt:0.8.3</product> <product>apt:0.8.4</product> <product>apt:0.8.5</product> <product>apt:0.8.6</product> <product>apt:0.8.7</product> <product>apt:0.8.8</product> <product>apt:0.8.9</product> <product>apt:0.8.10</product> <product>apt:0.8.10.1</product> <product>apt:0.8.10.2</product> <product>apt:0.8.10.3</product> <product>apt:0.8.11</product> <product>apt:0.8.11.1</product> <product>apt:0.8.11.2</product> <product>apt:0.8.11.3</product> <product>apt:0.8.11.4</product> <product>apt:0.8.11.5</product> <product>apt:0.8.12</product> <product>apt:0.8.13</product> <product>apt:0.8.13.1</product> <product>apt:0.8.13.2</product> <product>apt:0.8.14</product> <product>apt:0.8.14.1</product> <product>apt:0.8.15</product> <product>apt:0.8.15.1</product> <product>apt:0.8.15.2</product> <product>apt:0.8.15.3</product> <product>apt:0.8.15.4</product> <product>apt:0.8.15.5</product> <product>apt:0.8.15.6</product> <product>apt:0.8.15.7</product> <product>apt:0.8.15.8</product> <product>apt:0.8.15.9</product> <product>apt:0.9.0</product> <product>apt:0.9.1</product> <product>apt:0.9.2</product> <product>apt:0.9.3</product> <product>apt:0.9.4</product> <product>apt:0.9.5</product> <product>apt:0.9.5.1</product> <product>apt:0.9.6</product> <product>apt:0.9.7</product> <product>apt:0.9.7.1</product> <product>apt:0.9.7.2</product> <product>apt:0.9.7.3</product> <product>apt:0.9.7.4</product> <product>apt:0.9.7.5</product> <product>apt:0.9.7.6</product> <product>apt:0.9.7.7</product> <product>apt:0.9.7.8</product> <product>apt:0.9.7.9</product> <product>apt:0.9.8</product> <product>apt:0.9.8.1</product> <product>apt:0.9.9</product> <product>apt:0.9.9.1</product> <product>apt:0.9.9.2</product> <product>apt:0.9.9.3</product> <product>apt:0.9.9.4</product> <product>apt:0.9.10</product> <product>apt:0.9.11</product> <product>apt:0.9.11.1</product> <product>apt:0.9.11.2</product> <product>apt:0.9.11.3</product> <product>apt:0.9.11.4</product> <product>apt:0.9.12</product> <product>apt:0.9.12.1</product> <product>apt:0.9.13.1</product> <product>apt:0.9.13.1.ubuntu1</product> <product>apt:0.9.13.1ubuntu1</product> <product>apt:0.9.13.exp1</product> <product>apt:0.9.13.exp1ubuntu1</product> <product>apt:0.9.13_exp1</product> <product>apt:0.9.14</product> <product>apt:0.9.14.1</product> <product>apt:0.9.14.2</product> <product>apt:0.9.14.3.exp1</product> <product>apt:0.9.14.3.exp2</product> <product>apt:0.9.14.3.exp3</product> <product>apt:0.9.14.3.exp4</product> <product>apt:0.9.14.3.exp5</product> <product>apt:0.9.14ubuntu1</product> <product>apt:0.9.15</product> <product>apt:0.9.15.1</product> <product>apt:0.9.15.1ubuntu1</product> <product>apt:0.9.15.2</product> <product>apt:0.9.15.2ubuntu1</product> <product>apt:0.9.15.3</product> <product>apt:0.9.15.3ubuntu1</product> <product>apt:0.9.15.4</product> <product>apt:0.9.15.4ubuntu1</product> <product>apt:0.9.15.4ubuntu2</product> <product>apt:0.9.15.4ubuntu3</product> <product>apt:0.9.15.5</product> <product>apt:0.9.16</product> <product>apt:0.9.16.1</product> <product>apt:1.0.1</product> <product>apt:1.0.1ubuntu1</product> <product>apt:1.0.1ubuntu2</product> <product>apt:1.0.1ubuntu2.1</product> <product>apt:1.0.1ubuntu2.2</product> <product>apt:1.0.2</product> <product>apt:1.0.2ubuntu1</product> <product>apt:1.0.3</product> <product>apt:1.0.4</product> <product>apt:1.0.4ubuntu1</product> <product>apt:1.0.4ubuntu2</product> <product>apt:1.0.4ubuntu3</product> <product>apt:1.0.4ubuntu4</product> <product>apt:1.0.5</product> <product>apt:1.0.6</product> <product>apt:1.0.7</product> <product>apt:1.0.8</product> <product>apt:1.0.8ubuntu1</product> <product>apt:1.0.9.1</product> <product>apt:1.0.9.2</product> <product>apt:1.0.9.2ubuntu1</product> <product>apt:1.0.9.2ubuntu2</product> <product>apt:1.0.9.3</product> <product>apt:1.0.9.3ubuntu1</product> <product>apt:1.0.9.4</product> <product>apt:1.0.9.5</product> <product>apt:1.0.9.6</product> <product>apt:1.0.9.7</product> <product>apt:1.0.9.7ubuntu1</product> <product>apt:1.0.9.7ubuntu2</product> <product>apt:1.0.9.7ubuntu3</product> <product>apt:1.0.9.7ubuntu4</product> <product>apt:1.0.9.7ubuntu5</product> <product>apt:1.0.9.8</product> <product>apt:1.0.9.8.1</product> <product>apt:1.0.9.8.2</product> <product>apt:1.0.9.8.3</product> <product>apt:1.0.9.8.4</product> <product>apt:1.0.9.9</product> <product>apt:1.0.9.9ubuntu1</product> <product>apt:1.0.9.10</product> <product>apt:1.0.9.10ubuntu1</product> <product>apt:1.0.9.10ubuntu5</product> <product>apt:1.0.9.10ubuntu7</product> <product>apt:1.0.10</product> <product>apt:1.0.10.1</product> <product>apt:1.0.10.2</product> <product>apt:1.0.10.2ubuntu1</product> <product>apt:1.1.1</product> <product>apt:1.1.2</product> <product>apt:1.1.3</product> <product>apt:1.1.4</product> <product>apt:1.1.5</product> <product>apt:1.1.6</product> <product>apt:1.1.7</product> <product>apt:1.1.8</product> <product>apt:1.1.9</product> <product>apt:1.1.10</product> <product>apt:1.1.exp1</product> <product>apt:1.1.exp2</product> <product>apt:1.1.exp3</product> <product>apt:1.1.exp4</product> <product>apt:1.1.exp5</product> <product>apt:1.1.exp6</product> <product>apt:1.1.exp7</product> <product>apt:1.1.exp8</product> <product>apt:1.1.exp9</product> <product>apt:1.1.exp10</product> <product>apt:1.1.exp11</product> <product>apt:1.1.exp12</product> <product>apt:1.1.exp13</product> <product>apt:1.1_exp14</product> <product>apt:1.1_exp15</product> <product>apt:1.1_exp16</product> <product>apt:1.2.1</product> <product>apt:1.2.2</product> <product>apt:1.2.3</product> <product>apt:1.2.4</product> <product>apt:1.2.5</product> <product>apt:1.2.6</product> <product>apt:1.2.7</product> <product>apt:1.2.8</product> <product>apt:1.2.9</product> <product>apt:1.2.10</product> <product>apt:1.2.11</product> <product>apt:1.2.12</product> <product>apt:1.2.13</product> <product>apt:1.2.14</product> <product>apt:1.2.15</product> <product>apt:1.2.16</product> <product>apt:1.2.17</product> <product>apt:1.2.18</product> <product>apt:1.2.19</product> <product>apt:1.2.20</product> <product>apt:1.2.21</product> <product>apt:1.2.22</product> <product>apt:1.2.23</product> <product>apt:1.2.24</product> <product>apt:1.2.25</product> <product>apt:1.2_exp1</product> <product>apt:1.3.1</product> <product>apt:1.3.2</product> </cve> <cve id="CVE-2016-4373" level="LOW"> <product>operations_manager:9.20.0</product> <product>operations_manager:9.20.0</product> <product>operations_manager:9.20.0</product> <product>operations_manager:9.21.120</product> <product>operations_manager:9.21.120</product> <product>operations_manager:9.21.120</product> </cve> <cve id="CVE-2016-0254" level="LOW"> <product>cognos_business_intelligence:10.1.1</product> <product>cognos_business_intelligence:10.2</product> <product>cognos_business_intelligence:10.2.1</product> <product>cognos_business_intelligence:10.2.1.1</product> <product>cognos_business_intelligence:10.2.2</product> </cve> <cve id="CVE-2016-4168" level="MEDIUM"> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> </cve> <cve id="CVE-2016-0253" level="MEDIUM"> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-1789" level="MEDIUM"> <product>ibooks_author:2.4.0</product> </cve> <cve id="CVE-2016-7200" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-0523" level="LOW"> <product>interaction_blending:11.5.10.2</product> <product>interaction_blending:12.1.1</product> <product>interaction_blending:12.1.2</product> <product>interaction_blending:12.1.3</product> <product>interaction_blending:12.2.3</product> <product>interaction_blending:12.2.4</product> <product>interaction_blending:12.2.5</product> </cve> <cve id="CVE-2016-0250" level="LOW"> <product>infosphere_information_server:11.3</product> <product>infosphere_information_server:11.3.1</product> <product>infosphere_information_server:11.5</product> </cve> <cve id="CVE-2016-0789" level="MEDIUM"> <product>jenkins:1.642.1</product> <product>jenkins:1.649</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-0788" level="LOW"> <product>jenkins:1.642.1</product> <product>jenkins:1.649</product> <product>openshift:3.1</product> </cve> <cve id="CVE-2016-0781" level="MEDIUM"> <product>cloud_foundry:208</product> <product>cloud_foundry:209</product> <product>cloud_foundry:210</product> <product>cloud_foundry:211</product> <product>cloud_foundry:212</product> <product>cloud_foundry:213</product> <product>cloud_foundry:214</product> <product>cloud_foundry:215</product> <product>cloud_foundry:216</product> <product>cloud_foundry:217</product> <product>cloud_foundry:218</product> <product>cloud_foundry:219</product> <product>cloud_foundry:220</product> <product>cloud_foundry:221</product> <product>cloud_foundry:222</product> <product>cloud_foundry:223</product> <product>cloud_foundry:224</product> <product>cloud_foundry:225</product> <product>cloud_foundry:226</product> <product>cloud_foundry:227</product> <product>cloud_foundry:228</product> <product>cloud_foundry:229</product> <product>cloud_foundry:230</product> <product>cloud_foundry:231</product> <product>cloud_foundry:241</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.16</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_uaa:2.7.4.1</product> <product>cloud_foundry_uaa:3.0.0</product> <product>cloud_foundry_uaa:3.0.1</product> <product>cloud_foundry_uaa:3.1.0</product> <product>cloud_foundry_uaa:3.2.0</product> <product>cloud_foundry_uaa_release:2</product> <product>cloud_foundry_uaa_release:3</product> <product>cloud_foundry_uaa_release:4</product> <product>cloud_foundry_uaa_release:5</product> <product>cloud_foundry_uaa_release:6</product> <product>cloud_foundry_uaa_release:7</product> <product>login-server:-</product> </cve> <cve id="CVE-2016-0780" level="LOW"> <product>cloud_foundry_elastic_runtime:1.5.0</product> <product>cloud_foundry_elastic_runtime:1.5.1</product> <product>cloud_foundry_elastic_runtime:1.5.2</product> <product>cloud_foundry_elastic_runtime:1.5.3</product> <product>cloud_foundry_elastic_runtime:1.5.4</product> <product>cloud_foundry_elastic_runtime:1.5.5</product> <product>cloud_foundry_elastic_runtime:1.5.6</product> <product>cloud_foundry_elastic_runtime:1.5.7</product> <product>cloud_foundry_elastic_runtime:1.5.8</product> <product>cloud_foundry_elastic_runtime:1.5.9</product> <product>cloud_foundry_elastic_runtime:1.5.10</product> <product>cloud_foundry_elastic_runtime:1.5.11</product> <product>cloud_foundry_elastic_runtime:1.5.12</product> <product>cloud_foundry_elastic_runtime:1.5.13</product> <product>cloud_foundry_elastic_runtime:1.5.14</product> <product>cloud_foundry_elastic_runtime:1.5.15</product> <product>cloud_foundry_elastic_runtime:1.5.16</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.16</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime_cf_release:231</product> </cve> <cve id="CVE-2016-0783" level="LOW"> <product>openmeetings:3.1.0</product> </cve> <cve id="CVE-2016-0782" level="MEDIUM"> <product>activemq:5.1.0</product> <product>activemq:5.2.0</product> <product>activemq:5.3.0</product> <product>activemq:5.3.1</product> <product>activemq:5.3.2</product> <product>activemq:5.4.0</product> <product>activemq:5.4.1</product> <product>activemq:5.4.2</product> <product>activemq:5.4.3</product> <product>activemq:5.5.0</product> <product>activemq:5.5.1</product> <product>activemq:5.6.0</product> <product>activemq:5.7.0</product> <product>activemq:5.8.0</product> <product>activemq:5.9.0</product> <product>activemq:5.9.1</product> <product>activemq:5.10.0</product> <product>activemq:5.10.1</product> <product>activemq:5.10.2</product> <product>activemq:5.11.0</product> <product>activemq:5.11.1</product> <product>activemq:5.11.2</product> <product>activemq:5.11.3</product> <product>activemq:5.12.0</product> <product>activemq:5.12.1</product> <product>activemq:5.12.2</product> <product>activemq:5.13.0</product> <product>activemq:5.13.1</product> </cve> <cve id="CVE-2016-0785" level="LOW"> <product>struts:2.3.24.1</product> </cve> <cve id="CVE-2016-7172" level="LOW"> <product>snap_creator_framework:4.3.0</product> </cve> <cve id="CVE-2016-7171" level="MEDIUM"> <product>netapp_plug-in:2.0</product> </cve> <cve id="CVE-2016-7170" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-1438" level="LOW"> <product>asyncos:9.7.0-125</product> </cve> <cve id="CVE-2016-1439" level="MEDIUM"> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6%282%29</product> <product>unified_contact_center_enterprise:4.6.2</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:5.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:6.0%280%29</product> <product>unified_contact_center_enterprise:7.0%280%29</product> <product>unified_contact_center_enterprise:7.0%280%29</product> <product>unified_contact_center_enterprise:7.0%280%29</product> <product>unified_contact_center_enterprise:7.0%280%29</product> <product>unified_contact_center_enterprise:7.1%282%29</product> <product>unified_contact_center_enterprise:7.1%283%29</product> <product>unified_contact_center_enterprise:7.1%284%29</product> <product>unified_contact_center_enterprise:7.1%285%29</product> <product>unified_contact_center_enterprise:7.1.0</product> <product>unified_contact_center_enterprise:7.2%281%29</product> <product>unified_contact_center_enterprise:7.2%282%29</product> <product>unified_contact_center_enterprise:7.2%283%29</product> <product>unified_contact_center_enterprise:7.2%284%29</product> <product>unified_contact_center_enterprise:7.2%285%29</product> <product>unified_contact_center_enterprise:7.2%286%29</product> <product>unified_contact_center_enterprise:7.2%287%29</product> <product>unified_contact_center_enterprise:7.5%282%29</product> <product>unified_contact_center_enterprise:7.5%283%29</product> <product>unified_contact_center_enterprise:7.5%284%29</product> <product>unified_contact_center_enterprise:7.5%285%29</product> <product>unified_contact_center_enterprise:7.5%286%29</product> <product>unified_contact_center_enterprise:7.5%287%29</product> <product>unified_contact_center_enterprise:7.5%288%29</product> <product>unified_contact_center_enterprise:7.5%289%29</product> <product>unified_contact_center_enterprise:7.5%2810%29</product> <product>unified_contact_center_enterprise:8.0%282%29</product> <product>unified_contact_center_enterprise:8.0%283%29</product> <product>unified_contact_center_enterprise:8.5%281%29</product> <product>unified_contact_center_enterprise:8.5%282%29</product> <product>unified_contact_center_enterprise:8.5%283%29</product> <product>unified_contact_center_enterprise:8.5%284%29</product> <product>unified_contact_center_enterprise:9.0%282%29</product> <product>unified_contact_center_enterprise:9.0%283%29</product> <product>unified_contact_center_enterprise:9.0%284%29</product> <product>unified_contact_center_enterprise:10.0%281%29</product> <product>unified_contact_center_enterprise:10.0%282%29</product> <product>unified_contact_center_enterprise:10.5%281%29</product> <product>unified_contact_center_enterprise:10.5%282%29</product> </cve> <cve id="CVE-2016-10089" level="LOW"> <product>nagios:4.2.4</product> </cve> <cve id="CVE-2016-10086" level="LOW"> <product>service_desk_management:14.1</product> <product>service_desk_manager:12.9</product> </cve> <cve id="CVE-2016-10087" level="LOW"> <product>libpng:0.8</product> <product>libpng:0.71</product> <product>libpng:0.81</product> <product>libpng:0.82</product> <product>libpng:0.85</product> <product>libpng:0.86</product> <product>libpng:0.87</product> <product>libpng:0.88</product> <product>libpng:0.89</product> <product>libpng:0.89c</product> <product>libpng:0.90</product> <product>libpng:0.95</product> <product>libpng:0.96</product> <product>libpng:0.97</product> <product>libpng:0.98</product> <product>libpng:0.99</product> <product>libpng:0.99a</product> <product>libpng:0.99b</product> <product>libpng:0.99c</product> <product>libpng:0.99d</product> <product>libpng:0.99e</product> <product>libpng:0.99f</product> <product>libpng:0.99g</product> <product>libpng:0.99h</product> <product>libpng:1.00</product> <product>libpng:1.0.0</product> <product>libpng:1.0.0a</product> <product>libpng:1.0.0b</product> <product>libpng:1.0.1</product> <product>libpng:1.0.1a</product> <product>libpng:1.0.1b</product> <product>libpng:1.0.1c</product> <product>libpng:1.0.1d</product> <product>libpng:1.0.1e</product> <product>libpng:1.0.2</product> <product>libpng:1.0.2a</product> <product>libpng:1.0.3</product> <product>libpng:1.0.3a</product> <product>libpng:1.0.3b</product> <product>libpng:1.0.3d</product> <product>libpng:1.0.4</product> <product>libpng:1.0.4a</product> <product>libpng:1.0.4b</product> <product>libpng:1.0.4c</product> <product>libpng:1.0.4d</product> <product>libpng:1.0.4e</product> <product>libpng:1.0.4f</product> <product>libpng:1.0.5</product> <product>libpng:1.0.5a</product> <product>libpng:1.0.5b</product> <product>libpng:1.0.5c</product> <product>libpng:1.0.5d</product> <product>libpng:1.0.5e</product> <product>libpng:1.0.5f</product> <product>libpng:1.0.5g</product> <product>libpng:1.0.5h</product> <product>libpng:1.0.5i</product> <product>libpng:1.0.5j</product> <product>libpng:1.0.5k</product> <product>libpng:1.0.5l</product> <product>libpng:1.0.5m</product> <product>libpng:1.0.5n</product> <product>libpng:1.0.5o</product> <product>libpng:1.0.5p</product> <product>libpng:1.0.5q</product> <product>libpng:1.0.5r</product> <product>libpng:1.0.5s</product> <product>libpng:1.0.5t</product> <product>libpng:1.0.5u</product> <product>libpng:1.0.5v</product> <product>libpng:1.0.6</product> <product>libpng:1.0.6d</product> <product>libpng:1.0.6e</product> <product>libpng:1.0.6f</product> <product>libpng:1.0.6g</product> <product>libpng:1.0.6h</product> <product>libpng:1.0.6i</product> <product>libpng:1.0.6j</product> <product>libpng:1.0.7</product> <product>libpng:1.0.8</product> <product>libpng:1.0.9</product> <product>libpng:1.0.10</product> <product>libpng:1.0.11</product> <product>libpng:1.0.12</product> <product>libpng:1.0.13</product> <product>libpng:1.0.14</product> <product>libpng:1.0.15</product> <product>libpng:1.0.16</product> <product>libpng:1.0.17</product> <product>libpng:1.0.18</product> <product>libpng:1.0.19</product> <product>libpng:1.0.20</product> <product>libpng:1.0.21</product> <product>libpng:1.0.22</product> <product>libpng:1.0.23</product> <product>libpng:1.0.24</product> <product>libpng:1.0.25</product> <product>libpng:1.0.26</product> <product>libpng:1.0.27</product> <product>libpng:1.0.28</product> <product>libpng:1.0.29</product> <product>libpng:1.0.30</product> <product>libpng:1.0.31</product> <product>libpng:1.0.32</product> <product>libpng:1.0.33</product> <product>libpng:1.0.34</product> <product>libpng:1.0.35</product> <product>libpng:1.0.37</product> <product>libpng:1.0.38</product> <product>libpng:1.0.39</product> <product>libpng:1.0.40</product> <product>libpng:1.0.41</product> <product>libpng:1.0.42</product> <product>libpng:1.0.43</product> <product>libpng:1.0.44</product> <product>libpng:1.0.45</product> <product>libpng:1.0.46</product> <product>libpng:1.0.47</product> <product>libpng:1.0.48</product> <product>libpng:1.0.50</product> <product>libpng:1.0.51</product> <product>libpng:1.0.52</product> <product>libpng:1.0.53</product> <product>libpng:1.0.54</product> <product>libpng:1.0.55</product> <product>libpng:1.0.56</product> <product>libpng:1.0.57</product> <product>libpng:1.0.58</product> <product>libpng:1.0.59</product> <product>libpng:1.0.60</product> <product>libpng:1.0.61</product> <product>libpng:1.0.62</product> <product>libpng:1.0.63</product> <product>libpng:1.0.64</product> <product>libpng:1.0.65</product> <product>libpng:1.0.66</product> <product>libpng:1.2.0</product> <product>libpng:1.2.1</product> <product>libpng:1.2.3</product> <product>libpng:1.2.4</product> <product>libpng:1.2.6</product> <product>libpng:1.2.8</product> <product>libpng:1.2.10</product> <product>libpng:1.2.12</product> <product>libpng:1.2.13</product> <product>libpng:1.2.14</product> <product>libpng:1.2.16</product> <product>libpng:1.2.18</product> <product>libpng:1.2.20</product> <product>libpng:1.2.21</product> <product>libpng:1.2.22</product> <product>libpng:1.2.24</product> <product>libpng:1.2.25</product> <product>libpng:1.2.26</product> <product>libpng:1.2.27</product> <product>libpng:1.2.29</product> <product>libpng:1.2.32</product> <product>libpng:1.2.33</product> <product>libpng:1.2.35</product> <product>libpng:1.2.37</product> <product>libpng:1.2.38</product> <product>libpng:1.2.39</product> <product>libpng:1.2.41</product> <product>libpng:1.2.42</product> <product>libpng:1.2.44</product> <product>libpng:1.2.45</product> <product>libpng:1.2.46</product> <product>libpng:1.2.47</product> <product>libpng:1.2.50</product> <product>libpng:1.2.51</product> <product>libpng:1.2.52</product> <product>libpng:1.2.53</product> <product>libpng:1.2.54</product> <product>libpng:1.2.55</product> <product>libpng:1.2.56</product> <product>libpng:1.4.0</product> <product>libpng:1.4.1</product> <product>libpng:1.4.2</product> <product>libpng:1.4.3</product> <product>libpng:1.4.4</product> <product>libpng:1.4.5</product> <product>libpng:1.4.6</product> <product>libpng:1.4.7</product> <product>libpng:1.4.8</product> <product>libpng:1.4.9</product> <product>libpng:1.4.10</product> <product>libpng:1.4.11</product> <product>libpng:1.4.12</product> <product>libpng:1.4.13</product> <product>libpng:1.4.14</product> <product>libpng:1.4.15</product> <product>libpng:1.4.16</product> <product>libpng:1.4.17</product> <product>libpng:1.4.18</product> <product>libpng:1.4.19</product> <product>libpng:1.5.0</product> <product>libpng:1.5.1</product> <product>libpng:1.5.2</product> <product>libpng:1.5.3</product> <product>libpng:1.5.4</product> <product>libpng:1.5.5</product> <product>libpng:1.5.6</product> <product>libpng:1.5.7</product> <product>libpng:1.5.8</product> <product>libpng:1.5.9</product> <product>libpng:1.5.10</product> <product>libpng:1.5.11</product> <product>libpng:1.5.12</product> <product>libpng:1.5.13</product> <product>libpng:1.5.14</product> <product>libpng:1.5.15</product> <product>libpng:1.5.16</product> <product>libpng:1.5.17</product> <product>libpng:1.5.18</product> <product>libpng:1.5.19</product> <product>libpng:1.5.20</product> <product>libpng:1.5.21</product> <product>libpng:1.5.22</product> <product>libpng:1.5.23</product> <product>libpng:1.5.24</product> <product>libpng:1.5.25</product> <product>libpng:1.5.26</product> <product>libpng:1.5.27</product> <product>libpng:1.6.0</product> <product>libpng:1.6.1</product> <product>libpng:1.6.2</product> <product>libpng:1.6.3</product> <product>libpng:1.6.4</product> <product>libpng:1.6.5</product> <product>libpng:1.6.6</product> <product>libpng:1.6.7</product> <product>libpng:1.6.8</product> <product>libpng:1.6.9</product> <product>libpng:1.6.10</product> <product>libpng:1.6.11</product> <product>libpng:1.6.12</product> <product>libpng:1.6.13</product> <product>libpng:1.6.14</product> <product>libpng:1.6.15</product> <product>libpng:1.6.16</product> <product>libpng:1.6.17</product> <product>libpng:1.6.18</product> <product>libpng:1.6.19</product> <product>libpng:1.6.20</product> <product>libpng:1.6.21</product> <product>libpng:1.6.22</product> <product>libpng:1.6.23</product> <product>libpng:1.6.24</product> <product>libpng:1.6.25</product> <product>libpng:1.6.26</product> </cve> <cve id="CVE-2016-10084" level="LOW"> <product>piwigo:2.8.3</product> </cve> <cve id="CVE-2016-10085" level="LOW"> <product>piwigo:2.8.3</product> </cve> <cve id="CVE-2016-10082" level="LOW"> <product>serendipity:2.0.5</product> </cve> <cve id="CVE-2016-10083" level="MEDIUM"> <product>piwigo:2.8.3</product> </cve> <cve id="CVE-2016-1436" level="LOW"> <product>asr_5000_software:17.2.0</product> <product>asr_5000_software:17.2.0.59184</product> <product>asr_5000_software:17.3.1</product> <product>asr_5000_software:17.7.0</product> <product>asr_5000_software:18.0.0</product> <product>asr_5000_software:18.0.0.57828</product> <product>asr_5000_software:18.0.0.59167</product> <product>asr_5000_software:18.0.0.59211</product> <product>asr_5000_software:18.0.l0.59219</product> <product>asr_5000_software:18.1.0</product> <product>asr_5000_software:18.1.0.59776</product> <product>asr_5000_software:18.1.0.59780</product> <product>asr_5000_software:18.1_base</product> <product>asr_5000_software:18.4.0</product> <product>asr_5000_software:19.0.1</product> <product>asr_5000_software:19.0.m0.60737</product> <product>asr_5000_software:19.0.m0.60828</product> <product>asr_5000_software:19.0.m0.61045</product> <product>asr_5000_software:19.1.0</product> <product>asr_5000_software:19.1.0.61559</product> <product>asr_5000_software:19.2.0</product> <product>asr_5000_software:19.3.0</product> </cve> <cve id="CVE-2016-10081" level="MEDIUM"> <product>shutter:0.93.1</product> </cve> <cve id="CVE-2016-0259" level="LOW"> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> </cve> <cve id="CVE-2016-9209" level="MEDIUM"> <product>firepower_services_for_adaptive_security_appliance:5.3.0</product> <product>firepower_services_for_adaptive_security_appliance:5.4.0</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.1</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.2</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.3</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.4</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.5</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.6</product> <product>firepower_services_for_adaptive_security_appliance:5.4.1.7</product> <product>firepower_services_for_adaptive_security_appliance:6.0.0</product> <product>firepower_services_for_adaptive_security_appliance:6.0.1</product> <product>firepower_services_for_adaptive_security_appliance:6.1.0</product> </cve> <cve id="CVE-2016-9208" level="LOW"> <product>emergency_responder:11.5%282.10000.5%29</product> </cve> <cve id="CVE-2016-1000152" level="MEDIUM"> <product>tidio-form:1.0</product> </cve> <cve id="CVE-2016-1000153" level="MEDIUM"> <product>tidio-gallery:1.1</product> </cve> <cve id="CVE-2016-1000150" level="MEDIUM"> <product>simplified-content:1.0.0</product> </cve> <cve id="CVE-2016-9204" level="LOW"> <product>nexus_1000v_intercloud_firmware:2.2%281%29</product> </cve> <cve id="CVE-2016-9203" level="LOW"> <product>asr_5000_series_software:20.0.2.3.65026</product> </cve> <cve id="CVE-2016-9202" level="MEDIUM"> <product>email_security_appliance:9.1.1-036</product> <product>email_security_appliance:9.1.2-023</product> <product>email_security_appliance:9.1.2-028</product> <product>email_security_appliance:9.1.2-036</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> <product>email_security_appliance:9.7.1-066</product> <product>email_security_appliance:9.7.2-046</product> <product>email_security_appliance:9.7.2-047</product> <product>email_security_appliance:9.7.2-054</product> </cve> <cve id="CVE-2016-1000154" level="MEDIUM"> <product>whizz:1.0.7</product> </cve> <cve id="CVE-2016-9200" level="MEDIUM"> <product>prime_collaboration_assurance:10.5.1</product> <product>prime_collaboration_assurance:10.6.0</product> </cve> <cve id="CVE-2016-2004" level="MEDIUM"> <product>data_protector:7.03</product> <product>data_protector:8.14</product> <product>data_protector:9.05</product> </cve> <cve id="CVE-2016-2005" level="LOW"> <product>data_protector:7.03</product> <product>data_protector:8.14</product> <product>data_protector:9.05</product> </cve> <cve id="CVE-2016-2006" level="LOW"> <product>data_protector:7.03</product> <product>data_protector:8.14</product> <product>data_protector:9.05</product> </cve> <cve id="CVE-2016-2007" level="LOW"> <product>data_protector:7.03</product> <product>data_protector:8.14</product> <product>data_protector:9.05</product> </cve> <cve id="CVE-2016-2000" level="LOW"> <product>asset_manager:9.40</product> <product>asset_manager:9.41</product> <product>asset_manager:9.50</product> <product>asset_manager_cloudsystem_chargeback:9.40</product> </cve> <cve id="CVE-2016-2001" level="MEDIUM"> <product>universal_cmbd_foundation:10.0</product> <product>universal_cmbd_foundation:10.01</product> <product>universal_cmbd_foundation:10.10</product> <product>universal_cmbd_foundation:10.11</product> <product>universal_cmbd_foundation:10.20</product> </cve> <cve id="CVE-2016-2002" level="LOW"> <product>vertica:7.0.2.12</product> <product>vertica:7.1.2</product> <product>vertica:7.2.0</product> <product>vertica:7.2.1</product> </cve> <cve id="CVE-2016-2003" level="LOW"> <product>p9000_command_view_advanced_edition_software:-</product> <product>xp7_command_view_advanced_edition_suite:-</product> </cve> <cve id="CVE-2016-2008" level="LOW"> <product>data_protector:7.03</product> <product>data_protector:8.14</product> <product>data_protector:9.05</product> </cve> <cve id="CVE-2016-2009" level="LOW"> <product>network_node_manager_i:9.20</product> <product>network_node_manager_i:9.23</product> <product>network_node_manager_i:9.24</product> <product>network_node_manager_i:9.25</product> <product>network_node_manager_i:10.00</product> <product>network_node_manager_i:10.01</product> </cve> <cve id="CVE-2016-6839" level="MEDIUM"> <product>fusionaccess:v100r005c10</product> <product>fusionaccess:v100r005c20</product> <product>fusionaccess:v100r005c30</product> </cve> <cve id="CVE-2016-6838" level="MEDIUM"> <product>ch121_v3_server_firmware:v100r001c00</product> <product>ch140_v3_server_firmware:v100r001c00</product> <product>ch220_v3_server_firmware:v100r001c00</product> <product>ch222_v3_server_firmware:v100r001c00</product> <product>ch226_v3_server_firmware:v100r001c00</product> <product>rh1288_v3_server_firmware:v100r003c00</product> <product>rh2288_v3_server_firmware:v100r003c00</product> <product>x6800_v3_server_firmware:v100r003c00</product> <product>xh620_v3_server_firmware:v100r003c00</product> </cve> <cve id="CVE-2016-6831" level="LOW"> <product>chicken:4.11.0</product> </cve> <cve id="CVE-2016-6830" level="LOW"> <product>chicken:4.11.0</product> </cve> <cve id="CVE-2016-6833" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6832" level="MEDIUM"> <product>libav:11.3</product> </cve> <cve id="CVE-2016-6835" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6834" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6836" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6169" level="MEDIUM"> <product>foxit_reader:7.3.4.311</product> <product>phantompdf:7.3.4.311</product> </cve> <cve id="CVE-2016-6168" level="MEDIUM"> <product>foxit_reader:7.3.4.311</product> <product>phantompdf:7.3.4.311</product> </cve> <cve id="CVE-2016-6163" level="MEDIUM"> <product>librsvg:2.40.2</product> </cve> <cve id="CVE-2016-6160" level="LOW"> <product>tcpreplay:4.1.1</product> </cve> <cve id="CVE-2016-7780" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7781" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7782" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7783" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7784" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7786" level="LOW"> <product>cyberoam_cr25ing_utm_firmware:10.6.2</product> </cve> <cve id="CVE-2016-7788" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7789" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-4564" level="LOW"> <product>imagemagick:6.9.3-0</product> <product>imagemagick:7.0.0-0</product> <product>imagemagick:7.0.1-0</product> <product>imagemagick:7.0.1-1</product> </cve> <cve id="CVE-2016-1080" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1083" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1082" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-0316" level="MEDIUM"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-0317" level="MEDIUM"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0314" level="LOW"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0315" level="LOW"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0312" level="LOW"> <product>tririga_application_platform:3.3.1</product> </cve> <cve id="CVE-2016-0313" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0310" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-0311" level="MEDIUM"> <product>tivoli_business_service_manager:6.1.0</product> <product>tivoli_business_service_manager:6.1.1</product> </cve> <cve id="CVE-2016-0318" level="MEDIUM"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0319" level="LOW"> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-9430" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9431" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9432" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9433" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9434" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9435" level="MEDIUM"> <product>w3m:0.5.3%2bgit20160718</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9436" level="MEDIUM"> <product>w3m:0.5.3%2bgit20160718</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9437" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9438" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-9439" level="MEDIUM"> <product>w3m:0.5.3-30</product> </cve> <cve id="CVE-2016-10271" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10270" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-10273" level="LOW"> <product>air%3alink_3g_firmware:2.23m</product> <product>air%3alink_5000ac_firmware:1.13</product> <product>air%3alink_59300_firmware:1.04</product> </cve> <cve id="CVE-2016-10272" level="MEDIUM"> <product>libtiff:4.0.7</product> </cve> <cve id="CVE-2016-8341" level="LOW"> <product>integraxor:5.0.413.0</product> </cve> <cve id="CVE-2016-7242" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-8343" level="LOW"> <product>web_scada:-</product> </cve> <cve id="CVE-2016-5927" level="LOW"> <product>tivoli_storage_manager_for_space_management:6.3.0</product> <product>tivoli_storage_manager_for_space_management:6.3.2</product> <product>tivoli_storage_manager_for_space_management:6.4.0</product> <product>tivoli_storage_manager_for_space_management:6.4.0.0</product> <product>tivoli_storage_manager_for_space_management:6.4.1</product> <product>tivoli_storage_manager_for_space_management:6.4.2</product> <product>tivoli_storage_manager_for_space_management:6.4.3</product> <product>tivoli_storage_manager_for_space_management:7.1.0</product> <product>tivoli_storage_manager_for_space_management:7.1.1</product> <product>tivoli_storage_manager_for_space_management:7.1.2</product> <product>tivoli_storage_manager_for_space_management:7.1.3</product> <product>tivoli_storage_manager_for_space_management:7.1.4</product> </cve> <cve id="CVE-2016-8347" level="LOW"> <product>webdatorcentral:-</product> </cve> <cve id="CVE-2016-8346" level="LOW"> <product>edr-810_firmware:3.12</product> </cve> <cve id="CVE-2016-8348" level="LOW"> <product>liebert_sitescan_web:6.5</product> </cve> <cve id="CVE-2016-9698" level="LOW"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-9694" level="MEDIUM"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-9696" level="MEDIUM"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-9697" level="HIGH"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-9691" level="LOW"> <product>websphere_cast_iron_solution:7.0.0</product> <product>websphere_cast_iron_solution:7.0.0.1</product> <product>websphere_cast_iron_solution:7.0.0.2</product> <product>websphere_cast_iron_solution:7.5.0.0</product> <product>websphere_cast_iron_solution:7.5.0.1</product> <product>websphere_cast_iron_solution:7.5.1.0</product> </cve> <cve id="CVE-2016-9692" level="LOW"> <product>websphere_cast_iron_solution:7.0.0</product> <product>websphere_cast_iron_solution:7.0.0.1</product> <product>websphere_cast_iron_solution:7.0.0.2</product> <product>websphere_cast_iron_solution:7.5.0.0</product> <product>websphere_cast_iron_solution:7.5.0.1</product> <product>websphere_cast_iron_solution:7.5.1.0</product> </cve> <cve id="CVE-2016-9693" level="MEDIUM"> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> <product>websphere:7.2</product> <product>websphere:7.2.0.1</product> <product>websphere:7.2.0.2</product> <product>websphere:7.2.0.3</product> <product>websphere:7.2.0.4</product> <product>websphere:7.2.0.5</product> </cve> <cve id="CVE-2016-10411" level="LOW"> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-10410" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10412" level="LOW"> <product>fsm9055_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10415" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10414" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10417" level="MEDIUM"> <product>ipq4019_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10416" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_600_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> </cve> <cve id="CVE-2016-10419" level="LOW"> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10418" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> </cve> <cve id="CVE-2016-4521" level="LOW"> <product>bt-5_series_cellular_router_firmware:3.8.20</product> <product>bt-5_series_cellular_router_firmware:3.9.7</product> <product>bt-6_series_cellular_router_firmware:3.8.20</product> <product>bt-6_series_cellular_router_firmware:3.9.7</product> </cve> <cve id="CVE-2016-4520" level="LOW"> <product>pelco_digital_sentry_video_management_system_firmware:7.6.32.9203</product> </cve> <cve id="CVE-2016-4523" level="LOW"> <product>vtscada:8.0.05</product> <product>vtscada:8.0.12</product> <product>vtscada:8.0.16</product> <product>vtscada:8.0.18</product> <product>vtscada:8.1.05</product> <product>vtscada:8.1.06</product> <product>vtscada:9.0.02</product> <product>vtscada:9.0.03</product> <product>vtscada:9.0.08</product> <product>vtscada:9.1.02</product> <product>vtscada:9.1.03</product> <product>vtscada:9.1.05</product> <product>vtscada:9.1.09</product> <product>vtscada:9.1.11</product> <product>vtscada:9.1.14</product> <product>vtscada:9.1.20</product> <product>vtscada:10.0.11</product> <product>vtscada:10.0.13</product> <product>vtscada:10.0.14</product> <product>vtscada:10.0.16</product> <product>vtscada:10.0.17</product> <product>vtscada:10.1.05</product> <product>vtscada:10.1.06</product> <product>vtscada:10.1.07</product> <product>vtscada:10.1.12</product> <product>vtscada:10.2.05</product> <product>vtscada:10.2.07</product> <product>vtscada:10.2.08</product> <product>vtscada:10.2.11</product> <product>vtscada:10.2.13</product> <product>vtscada:10.2.14</product> <product>vtscada:10.2.15</product> <product>vtscada:10.2.17</product> <product>vtscada:10.2.19</product> <product>vtscada:10.2.20</product> <product>vtscada:10.2.21</product> <product>vtscada:10.2.22</product> <product>vtscada:11.0.05</product> <product>vtscada:11.0.07</product> <product>vtscada:11.1.05</product> <product>vtscada:11.1.06</product> <product>vtscada:11.1.09</product> <product>vtscada:11.1.10</product> <product>vtscada:11.1.13</product> <product>vtscada:11.1.14</product> <product>vtscada:11.1.15</product> <product>vtscada:11.1.16</product> <product>vtscada:11.1.17</product> <product>vtscada:11.1.18</product> <product>vtscada:11.1.19</product> <product>vtscada:11.1.20</product> <product>vtscada:11.1.21</product> <product>vtscada:11.1.22</product> <product>vtscada:11.1.24</product> </cve> <cve id="CVE-2016-4522" level="LOW"> <product>factorytalk_energrymetrix:2.10.00</product> </cve> <cve id="CVE-2016-4525" level="MEDIUM"> <product>webaccess:8.1</product> </cve> <cve id="CVE-2016-4524" level="LOW"> <product>pcm600:2.6</product> </cve> <cve id="CVE-2016-4527" level="MEDIUM"> <product>pcm600:2.6</product> </cve> <cve id="CVE-2016-4526" level="MEDIUM"> <product>tracer_sc:4.2.1134</product> </cve> <cve id="CVE-2016-4529" level="LOW"> <product>somachine_hvac_firmware:2.0.2</product> </cve> <cve id="CVE-2016-4528" level="MEDIUM"> <product>webaccess:8.1</product> </cve> <cve id="CVE-2016-4021" level="LOW"> <product>pgpdump:0.29</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-6405" level="LOW"> <product>fog_director:1.0%280%29</product> </cve> <cve id="CVE-2016-1127" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4025" level="LOW"> <product>business_security:11.1.2241</product> <product>business_security:11.1.2245</product> <product>business_security:11.1.2253</product> <product>business_security:11.1.2260</product> <product>business_security:11.1.2261</product> <product>business_security:11.1.2262</product> <product>email_server_security:8.0.1606</product> <product>email_server_security:8.0.1609</product> <product>endpoint_protection:8.0.1606</product> <product>endpoint_protection:8.0.1609</product> <product>endpoint_protection_plus:8.0.1606</product> <product>endpoint_protection_plus:8.0.1609</product> <product>endpoint_protection_suite:8.0.1606</product> <product>endpoint_protection_suite:8.0.1609</product> <product>endpoint_protection_suite_plus:8.0.1606</product> <product>endpoint_protection_suite_plus:8.0.1609</product> <product>file_server_security:8.0.1606</product> <product>file_server_security:8.0.1609</product> <product>free_antivirus:11.1.2241</product> <product>free_antivirus:11.1.2245</product> <product>free_antivirus:11.1.2253</product> <product>free_antivirus:11.1.2260</product> <product>free_antivirus:11.1.2261</product> <product>free_antivirus:11.1.2262</product> <product>internet_security:11.1.2241</product> <product>internet_security:11.1.2245</product> <product>internet_security:11.1.2253</product> <product>internet_security:11.1.2260</product> <product>internet_security:11.1.2261</product> <product>internet_security:11.1.2262</product> <product>premier:11.1.2241</product> <product>premier:11.1.2245</product> <product>premier:11.1.2253</product> <product>premier:11.1.2260</product> <product>premier:11.1.2261</product> <product>premier:11.1.2262</product> <product>pro_antivirus:11.1.2241</product> <product>pro_antivirus:11.1.2245</product> <product>pro_antivirus:11.1.2253</product> <product>pro_antivirus:11.1.2260</product> <product>pro_antivirus:11.1.2261</product> <product>pro_antivirus:11.1.2262</product> </cve> <cve id="CVE-2016-6318" level="LOW"> <product>cracklib:-</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-6319" level="MEDIUM"> <product>foreman:1.12.1</product> </cve> <cve id="CVE-2016-6317" level="LOW"> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.2</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5.1</product> <product>ruby_on_rails:4.2.5.2</product> <product>ruby_on_rails:4.2.6</product> <product>ruby_on_rails:4.2.6</product> <product>ruby_on_rails:4.2.7</product> <product>ruby_on_rails:4.2.7</product> </cve> <cve id="CVE-2016-6310" level="LOW"> <product>enterprise_virtualization:3.6</product> </cve> <cve id="CVE-2016-6311" level="LOW"> <product>jboss_enterprise_application_platform:7.0</product> </cve> <cve id="CVE-2016-10644" level="MEDIUM"> <product>slimerjs-edge:-</product> </cve> <cve id="CVE-2016-10645" level="MEDIUM"> <product>grunt-images:-</product> </cve> <cve id="CVE-2016-10646" level="MEDIUM"> <product>resourcehacker:-</product> </cve> <cve id="CVE-2016-10647" level="MEDIUM"> <product>node-air-sdk:-</product> </cve> <cve id="CVE-2016-10640" level="MEDIUM"> <product>node-thulac:-</product> </cve> <cve id="CVE-2016-10641" level="MEDIUM"> <product>node-bsdiff-android:0.1.5</product> </cve> <cve id="CVE-2016-10642" level="MEDIUM"> <product>cmake:-</product> </cve> <cve id="CVE-2016-10643" level="MEDIUM"> <product>jstestdriver:-</product> </cve> <cve id="CVE-2016-10648" level="MEDIUM"> <product>marionette-socket-host:-</product> </cve> <cve id="CVE-2016-10649" level="MEDIUM"> <product>frames-compiler:-</product> </cve> <cve id="CVE-2016-8946" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-8649" level="LOW"> <product>lxc:1.0.8</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.0</product> <product>lxc:2.0.1</product> <product>lxc:2.0.2</product> <product>lxc:2.0.3</product> <product>lxc:2.0.4</product> <product>lxc:2.0.5</product> </cve> <cve id="CVE-2016-8644" level="LOW"> <product>moodle:2.7.16</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:2.9.7</product> <product>moodle:2.9.8</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.0.5</product> <product>moodle:3.0.6</product> <product>moodle:3.1.0</product> <product>moodle:3.1.1</product> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-8647" level="LOW"> <product>virtualization:4.1</product> </cve> <cve id="CVE-2016-8642" level="LOW"> <product>moodle:2.7.16</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:2.9.7</product> <product>moodle:2.9.8</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.0.5</product> <product>moodle:3.0.6</product> <product>moodle:3.1.0</product> <product>moodle:3.1.1</product> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-8643" level="LOW"> <product>moodle:2.7.16</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:2.9.7</product> <product>moodle:2.9.8</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.0.5</product> <product>moodle:3.0.6</product> <product>moodle:3.1.0</product> <product>moodle:3.1.1</product> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-0411" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> </cve> <cve id="CVE-2016-0413" level="LOW"> <product>fusion_middleware:11.1.1.7</product> </cve> <cve id="CVE-2016-0412" level="MEDIUM"> <product>peoplesoft_supply_chain_management_eprocurement:9.1</product> <product>peoplesoft_supply_chain_management_eprocurement:9.2</product> </cve> <cve id="CVE-2016-0415" level="MEDIUM"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-4318" level="MEDIUM"> <product>jira:7.1.8</product> </cve> <cve id="CVE-2016-4319" level="MEDIUM"> <product>jira:7.1.8</product> </cve> <cve id="CVE-2016-5686" level="MEDIUM"> <product>onetouch_ping_firmware:-</product> </cve> <cve id="CVE-2016-4312" level="MEDIUM"> <product>identity_server:5.1.0</product> </cve> <cve id="CVE-2016-4313" level="MEDIUM"> <product>extplorer:2.1.9</product> </cve> <cve id="CVE-2016-1230" level="MEDIUM"> <product>webarena_service_formmail:2.2.0</product> </cve> <cve id="CVE-2016-4311" level="MEDIUM"> <product>identity_server:5.1.0</product> </cve> <cve id="CVE-2016-4316" level="MEDIUM"> <product>carbon:4.4.5</product> </cve> <cve id="CVE-2016-4317" level="MEDIUM"> <product>confluence:5.9.10</product> </cve> <cve id="CVE-2016-1234" level="LOW"> <product>glibc:2.2.3</product> <product>fedora:23</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-4315" level="MEDIUM"> <product>carbon:4.4.5</product> </cve> <cve id="CVE-2016-3509" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3506" level="MEDIUM"> <product>jdbc:11.2.0.4</product> <product>jdbc:12.1.0.1</product> <product>jdbc:12.1.0.2</product> </cve> <cve id="CVE-2016-3507" level="MEDIUM"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3504" level="LOW"> <product>jdeveloper:11.1.1.7.0</product> <product>jdeveloper:11.1.1.9.0</product> <product>jdeveloper:11.1.2.4.0</product> <product>jdeveloper:12.1.3.0.0</product> <product>jdeveloper:12.2.1.0.0</product> </cve> <cve id="CVE-2016-3502" level="MEDIUM"> <product>webcenter_sites:11.1.1.8</product> <product>webcenter_sites:12.2.1.0</product> </cve> <cve id="CVE-2016-3503" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5680" level="LOW"> <product>readynas_surveillance:1.1.2</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> </cve> <cve id="CVE-2016-7195" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7194" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7196" level="HIGH"> <product>edge</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7191" level="MEDIUM"> <product>azure_active_directory_passport:1.0.0</product> <product>azure_active_directory_passport:1.1.0</product> <product>azure_active_directory_passport:1.1.1</product> <product>azure_active_directory_passport:1.2.0</product> <product>azure_active_directory_passport:1.3.0</product> <product>azure_active_directory_passport:1.3.1</product> <product>azure_active_directory_passport:1.3.2</product> <product>azure_active_directory_passport:1.3.3</product> <product>azure_active_directory_passport:1.3.4</product> <product>azure_active_directory_passport:1.3.5</product> <product>azure_active_directory_passport:1.3.6</product> <product>azure_active_directory_passport:1.4.0</product> <product>azure_active_directory_passport:1.4.1</product> <product>azure_active_directory_passport:1.4.2</product> <product>azure_active_directory_passport:1.4.3</product> <product>azure_active_directory_passport:1.4.4</product> <product>azure_active_directory_passport:1.4.5</product> <product>azure_active_directory_passport:2.0.0</product> </cve> <cve id="CVE-2016-7190" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7199" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7198" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7999" level="MEDIUM"> <product>spip:3.1.2</product> </cve> <cve id="CVE-2016-7998" level="LOW"> <product>spip:3.1.2</product> </cve> <cve id="CVE-2016-7995" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-7994" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-7997" level="LOW"> <product>graphicsmagick:1.3.25</product> </cve> <cve id="CVE-2016-7996" level="LOW"> <product>graphicsmagick:1.3.25</product> </cve> <cve id="CVE-2016-7993" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7992" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-9599" level="MEDIUM"> <product>puppet-tripleo:5.5.0</product> <product>puppet-tripleo:6.2.0</product> <product>openstack:10.0</product> </cve> <cve id="CVE-2016-9595" level="LOW"> <product>satellite:6.3</product> <product>satellite_capsule:6.3</product> </cve> <cve id="CVE-2016-9594" level="MEDIUM"> <product>curl:6.0</product> <product>curl:6.1</product> <product>curl:6.1</product> <product>curl:6.2</product> <product>curl:6.3</product> <product>curl:6.3.1</product> <product>curl:6.4</product> <product>curl:6.5</product> <product>curl:6.5.1</product> <product>curl:6.5.2</product> <product>curl:7.1</product> <product>curl:7.1.1</product> <product>curl:7.2</product> <product>curl:7.2.1</product> <product>curl:7.3</product> <product>curl:7.4</product> <product>curl:7.4.1</product> <product>curl:7.4.2</product> <product>curl:7.5</product> <product>curl:7.5.1</product> <product>curl:7.5.2</product> <product>curl:7.6</product> <product>curl:7.6.1</product> <product>curl:7.7</product> <product>curl:7.7.1</product> <product>curl:7.7.2</product> <product>curl:7.7.3</product> <product>curl:7.8</product> <product>curl:7.8.1</product> <product>curl:7.9</product> <product>curl:7.9.1</product> <product>curl:7.9.2</product> <product>curl:7.9.3</product> <product>curl:7.9.4</product> <product>curl:7.9.5</product> <product>curl:7.9.6</product> <product>curl:7.9.7</product> <product>curl:7.9.8</product> <product>curl:7.10</product> <product>curl:7.10.1</product> <product>curl:7.10.2</product> <product>curl:7.10.3</product> <product>curl:7.10.4</product> <product>curl:7.10.5</product> <product>curl:7.10.6</product> <product>curl:7.10.7</product> <product>curl:7.10.8</product> <product>curl:7.11.0</product> <product>curl:7.11.1</product> <product>curl:7.11.2</product> <product>curl:7.12.0</product> <product>curl:7.12.1</product> <product>curl:7.12.2</product> <product>curl:7.12.3</product> <product>curl:7.13.0</product> <product>curl:7.13.1</product> <product>curl:7.13.2</product> <product>curl:7.14.0</product> <product>curl:7.14.1</product> <product>curl:7.15.0</product> <product>curl:7.15.1</product> <product>curl:7.15.2</product> <product>curl:7.15.3</product> <product>curl:7.15.4</product> <product>curl:7.15.5</product> <product>curl:7.16.0</product> <product>curl:7.16.1</product> <product>curl:7.16.2</product> <product>curl:7.16.3</product> <product>curl:7.16.4</product> <product>curl:7.17.0</product> <product>curl:7.17.1</product> <product>curl:7.18.0</product> <product>curl:7.18.1</product> <product>curl:7.18.2</product> <product>curl:7.19.0</product> <product>curl:7.19.1</product> <product>curl:7.19.2</product> <product>curl:7.19.3</product> <product>curl:7.19.4</product> <product>curl:7.19.5</product> <product>curl:7.19.6</product> <product>curl:7.19.7</product> <product>curl:7.20.0</product> <product>curl:7.20.1</product> <product>curl:7.21.0</product> <product>curl:7.21.1</product> <product>curl:7.21.2</product> <product>curl:7.21.3</product> <product>curl:7.21.4</product> <product>curl:7.21.5</product> <product>curl:7.21.6</product> <product>curl:7.21.7</product> <product>curl:7.22.0</product> <product>curl:7.23.0</product> <product>curl:7.23.1</product> <product>curl:7.24.0</product> <product>curl:7.25.0</product> <product>curl:7.26.0</product> <product>curl:7.27.0</product> <product>curl:7.28.0</product> <product>curl:7.28.1</product> <product>curl:7.29.0</product> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> <product>curl:7.51.0</product> <product>curl:7.52.0</product> </cve> <cve id="CVE-2016-9593" level="LOW"> <product>satellite:6.0</product> <product>foreman:0.1</product> <product>foreman:0.2</product> <product>foreman:0.3</product> <product>foreman:0.4</product> <product>foreman:0.4.1</product> <product>foreman:1.0</product> <product>foreman:1.1</product> <product>foreman:1.2.0</product> <product>foreman:1.2.0</product> <product>foreman:1.2.0</product> <product>foreman:1.2.1</product> <product>foreman:1.2.2</product> <product>foreman:1.2.3</product> <product>foreman:1.4.0</product> <product>foreman:1.4.1</product> <product>foreman:1.4.2</product> <product>foreman:1.4.3</product> <product>foreman:1.4.4</product> <product>foreman:1.4.5</product> <product>foreman:1.5.0</product> <product>foreman:1.5.1</product> <product>foreman:1.5.3</product> <product>foreman:1.6.0</product> <product>foreman:1.6.1</product> <product>foreman:1.8.3</product> <product>foreman:1.8.4</product> <product>foreman:1.9.0</product> <product>foreman:1.9.1</product> <product>foreman:1.9.2</product> <product>foreman:1.9.3</product> <product>foreman:1.10.1</product> <product>foreman:1.10.2</product> <product>foreman:1.10.3</product> <product>foreman:1.10.4</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.1</product> <product>foreman:1.11.2</product> <product>foreman:1.11.3</product> <product>foreman:1.11.4</product> <product>foreman:1.12.0</product> <product>foreman:1.12.1</product> <product>foreman:1.12.2</product> <product>foreman:1.12.3</product> <product>foreman:1.12.4</product> <product>foreman:1.13.1</product> <product>foreman:1.13.2</product> <product>foreman:1.13.3</product> <product>foreman:1.13.4</product> <product>foreman:1.14.1</product> <product>foreman:1.14.2</product> <product>foreman:1.14.3</product> </cve> <cve id="CVE-2016-9592" level="LOW"> <product>openshift:3.2.1.23</product> <product>openshift:3.3.1.11</product> <product>openshift:3.4</product> </cve> <cve id="CVE-2016-9590" level="LOW"> <product>openstack:8.0</product> <product>openstack:9.0</product> <product>openstack:10.0</product> </cve> <cve id="CVE-2016-7891" level="MEDIUM"> <product>robohelp:11.0</product> <product>robohelp:2015.0.3</product> </cve> <cve id="CVE-2016-5045" level="MEDIUM"> <product>oncommand_system_manager:8.3</product> <product>oncommand_system_manager:8.3.1</product> <product>oncommand_system_manager:8.3.2</product> </cve> <cve id="CVE-2016-5044" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5047" level="LOW"> <product>oncommand_system_manager:8.3</product> <product>oncommand_system_manager:8.3.1</product> <product>oncommand_system_manager:8.3.2</product> </cve> <cve id="CVE-2016-5041" level="LOW"> <product>libdwarf:20160922</product> </cve> <cve id="CVE-2016-5040" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5043" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5042" level="LOW"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5049" level="LOW"> <product>readydesk:9.1</product> </cve> <cve id="CVE-2016-5048" level="LOW"> <product>readydesk:9.1</product> </cve> <cve id="CVE-2016-9773" level="MEDIUM"> <product>imagemagick:7.0.3-8</product> </cve> <cve id="CVE-2016-9772" level="LOW"> <product>openafs:1.6.19</product> </cve> <cve id="CVE-2016-9776" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-5593" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> </cve> <cve id="CVE-2016-5592" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> </cve> <cve id="CVE-2016-5591" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> </cve> <cve id="CVE-2016-5597" level="MEDIUM"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5596" level="LOW"> <product>customer_relationship_management_technical_foundation:12.1.1</product> <product>customer_relationship_management_technical_foundation:12.1.2</product> <product>customer_relationship_management_technical_foundation:12.1.3</product> <product>customer_relationship_management_technical_foundation:12.2.3</product> <product>customer_relationship_management_technical_foundation:12.2.4</product> <product>customer_relationship_management_technical_foundation:12.2.5</product> <product>customer_relationship_management_technical_foundation:12.2.6</product> </cve> <cve id="CVE-2016-5595" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> </cve> <cve id="CVE-2016-5594" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> </cve> <cve id="CVE-2016-5599" level="LOW"> <product>advanced_supply_chain_planning:12.2.3</product> <product>advanced_supply_chain_planning:12.2.4</product> <product>advanced_supply_chain_planning:12.2.5</product> </cve> <cve id="CVE-2016-8492" level="MEDIUM"> <product>fortios:4.3.0</product> <product>fortios:4.3.10</product> <product>fortios:4.3.12</product> <product>fortios:4.3.13</product> <product>fortios:4.3.14</product> <product>fortios:4.3.15</product> <product>fortios:4.3.16</product> <product>fortios:4.3.17</product> <product>fortios:4.3.18</product> </cve> <cve id="CVE-2016-0267" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1.0</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1.0</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> </cve> <cve id="CVE-2016-6815" level="LOW"> <product>ranger:0.4.0</product> <product>ranger:0.5.0</product> <product>ranger:0.5.1</product> <product>ranger:0.5.2</product> <product>ranger:0.5.3</product> <product>ranger:0.6.0</product> <product>ranger:0.6.1</product> </cve> <cve id="CVE-2016-6813" level="LOW"> <product>cloudstack:4.1.0</product> <product>cloudstack:4.1.1</product> <product>cloudstack:4.2.0</product> <product>cloudstack:4.4.4</product> <product>cloudstack:4.5.1</product> <product>cloudstack:4.5.2</product> <product>cloudstack:4.6.0</product> <product>cloudstack:4.6.1</product> <product>cloudstack:4.6.2</product> <product>cloudstack:4.7.0</product> <product>cloudstack:4.8</product> <product>cloudstack:4.9.0.0</product> </cve> <cve id="CVE-2016-6812" level="MEDIUM"> <product>cxf:3.0.11</product> <product>cxf:3.1.0</product> <product>cxf:3.1.1</product> <product>cxf:3.1.2</product> <product>cxf:3.1.3</product> <product>cxf:3.1.4</product> <product>cxf:3.1.5</product> <product>cxf:3.1.6</product> <product>cxf:3.1.7</product> <product>cxf:3.1.8</product> </cve> <cve id="CVE-2016-6811" level="LOW"> <product>hadoop:2.2.0</product> <product>hadoop:2.3.0</product> <product>hadoop:2.4.0</product> <product>hadoop:2.4.1</product> <product>hadoop:2.5.0</product> <product>hadoop:2.5.1</product> <product>hadoop:2.6.0</product> <product>hadoop:2.6.1</product> <product>hadoop:2.6.2</product> <product>hadoop:2.6.3</product> <product>hadoop:2.6.4</product> <product>hadoop:2.7.0</product> <product>hadoop:2.7.1</product> <product>hadoop:2.7.2</product> <product>hadoop:2.7.3</product> </cve> <cve id="CVE-2016-6810" level="MEDIUM"> <product>activemq:5.0.0</product> <product>activemq:5.1.0</product> <product>activemq:5.2.0</product> <product>activemq:5.3.0</product> <product>activemq:5.3.1</product> <product>activemq:5.3.2</product> <product>activemq:5.4.0</product> <product>activemq:5.4.1</product> <product>activemq:5.4.2</product> <product>activemq:5.4.3</product> <product>activemq:5.5.0</product> <product>activemq:5.5.1</product> <product>activemq:5.6.0</product> <product>activemq:5.7.0</product> <product>activemq:5.8.0</product> <product>activemq:5.9.0</product> <product>activemq:5.9.1</product> <product>activemq:5.10.0</product> <product>activemq:5.10.1</product> <product>activemq:5.10.2</product> <product>activemq:5.11.0</product> <product>activemq:5.11.1</product> <product>activemq:5.11.2</product> <product>activemq:5.11.3</product> <product>activemq:5.12.0</product> <product>activemq:5.12.1</product> <product>activemq:5.13.1</product> <product>activemq:5.13.3</product> </cve> <cve id="CVE-2016-6818" level="LOW"> <product>business_intelligence_platform:-</product> </cve> <cve id="CVE-2016-6933" level="MEDIUM"> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> <product>experience_manager:6.2.0</product> <product>livecycle:10.0.4</product> <product>livecycle:11.0.1</product> </cve> <cve id="CVE-2016-6100" level="MEDIUM"> <product>disposal_and_governance_management_for_it:6.0</product> <product>disposal_and_governance_management_for_it:6.0.1.0</product> <product>disposal_and_governance_management_for_it:6.0.1.1</product> <product>disposal_and_governance_management_for_it:6.0.1.2</product> <product>disposal_and_governance_management_for_it:6.0.1.3</product> <product>disposal_and_governance_management_for_it:6.0.1.4</product> <product>disposal_and_governance_management_for_it:6.0.1.5</product> <product>disposal_and_governance_management_for_it:6.0.1.6</product> <product>disposal_and_governance_management_for_it:6.0.1.7</product> <product>disposal_and_governance_management_for_it:6.0.2</product> <product>disposal_and_governance_management_for_it:6.0.3</product> <product>disposal_and_governance_management_for_it:6.0.3.1</product> <product>disposal_and_governance_management_for_it:6.0.3.2</product> <product>disposal_and_governance_management_for_it:6.0.3.3</product> <product>disposal_and_governance_management_for_it:6.0.3.4</product> <product>global_retention_policy_and_schedule_management:6.0</product> <product>global_retention_policy_and_schedule_management:6.0.1.0</product> <product>global_retention_policy_and_schedule_management:6.0.1.1</product> <product>global_retention_policy_and_schedule_management:6.0.1.2</product> <product>global_retention_policy_and_schedule_management:6.0.1.3</product> <product>global_retention_policy_and_schedule_management:6.0.1.4</product> <product>global_retention_policy_and_schedule_management:6.0.1.5</product> <product>global_retention_policy_and_schedule_management:6.0.1.6</product> <product>global_retention_policy_and_schedule_management:6.0.1.7</product> <product>global_retention_policy_and_schedule_management:6.0.2</product> <product>global_retention_policy_and_schedule_management:6.0.3</product> <product>global_retention_policy_and_schedule_management:6.0.3.1</product> <product>global_retention_policy_and_schedule_management:6.0.3.2</product> <product>global_retention_policy_and_schedule_management:6.0.3.3</product> <product>global_retention_policy_and_schedule_management:6.0.3.4</product> </cve> <cve id="CVE-2016-6103" level="MEDIUM"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6102" level="MEDIUM"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6105" level="LOW"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6104" level="LOW"> <product>security_key_lifecycle_manager:2.5.0</product> <product>security_key_lifecycle_manager:2.5.0.0</product> <product>security_key_lifecycle_manager:2.5.0.1</product> <product>security_key_lifecycle_manager:2.5.0.2</product> <product>security_key_lifecycle_manager:2.5.0.3</product> <product>security_key_lifecycle_manager:2.5.0.4</product> <product>security_key_lifecycle_manager:2.5.0.5</product> <product>security_key_lifecycle_manager:2.5.0.6</product> <product>security_key_lifecycle_manager:2.5.0.7</product> <product>security_key_lifecycle_manager:2.6.0</product> <product>security_key_lifecycle_manager:2.6.0.1</product> <product>security_key_lifecycle_manager:2.6.0.2</product> </cve> <cve id="CVE-2016-6937" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-0338" level="LOW"> <product>security_identity_manager_adapter:7.0.0.0</product> <product>security_identity_manager_adapter:7.0.0.1</product> <product>security_identity_manager_adapter:7.0.0.2</product> <product>security_identity_manager_adapter:7.0.0.3</product> <product>security_identity_manager_adapter:7.0.1.0</product> <product>security_identity_manager_adapter:7.0.1.1</product> </cve> <cve id="CVE-2016-0339" level="MEDIUM"> <product>security_identity_manager_adapter:7.0.0.0</product> <product>security_identity_manager_adapter:7.0.0.1</product> <product>security_identity_manager_adapter:7.0.0.2</product> <product>security_identity_manager_adapter:7.0.0.3</product> <product>security_identity_manager_adapter:7.0.1.0</product> <product>security_identity_manager_adapter:7.0.1.1</product> </cve> <cve id="CVE-2016-0335" level="MEDIUM"> <product>security_identity_manager:7.0.0.0</product> <product>security_identity_manager:7.0.0.1</product> <product>security_identity_manager:7.0.0.2</product> <product>security_identity_manager:7.0.0.3</product> <product>security_identity_manager:7.0.1.0</product> </cve> <cve id="CVE-2016-0336" level="MEDIUM"> <product>security_identity_manager:7.0.0.0</product> <product>security_identity_manager:7.0.0.1</product> <product>security_identity_manager:7.0.0.2</product> <product>security_identity_manager:7.0.0.3</product> <product>security_identity_manager:7.0.1.0</product> </cve> <cve id="CVE-2016-0330" level="LOW"> <product>security_identity_manager_adapter:7.0.0.0</product> <product>security_identity_manager_adapter:7.0.0.1</product> <product>security_identity_manager_adapter:7.0.0.2</product> <product>security_identity_manager_adapter:7.0.0.3</product> <product>security_identity_manager_adapter:7.0.1.0</product> <product>security_identity_manager_adapter:7.0.1.1</product> </cve> <cve id="CVE-2016-0331" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-0332" level="LOW"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> </cve> <cve id="CVE-2016-9908" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-9909" level="MEDIUM"> <product>html5lib:0.99999999</product> </cve> <cve id="CVE-2016-9907" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-10259" level="MEDIUM"> <product>ssl_visibility_appliance_sv1800_firmware:3.8.4</product> <product>ssl_visibility_appliance_sv1800_firmware:3.9</product> <product>ssl_visibility_appliance_sv1800_firmware:3.10</product> <product>ssl_visibility_appliance_sv1800_firmware:3.11</product> <product>ssl_visibility_appliance_sv1800_firmware:3.11.1.1</product> <product>ssl_visibility_appliance_sv1800_firmware:3.11.1.2</product> <product>ssl_visibility_appliance_sv1800_firmware:3.11.2.1</product> <product>ssl_visibility_appliance_sv2800_firmware:3.8.4</product> <product>ssl_visibility_appliance_sv2800_firmware:3.9</product> <product>ssl_visibility_appliance_sv2800_firmware:3.10</product> <product>ssl_visibility_appliance_sv2800_firmware:3.11</product> <product>ssl_visibility_appliance_sv2800_firmware:3.11.1.1</product> <product>ssl_visibility_appliance_sv2800_firmware:3.11.1.2</product> <product>ssl_visibility_appliance_sv2800_firmware:3.11.2.1</product> <product>ssl_visibility_appliance_sv3800_firmware:3.8.4</product> <product>ssl_visibility_appliance_sv3800_firmware:3.9</product> <product>ssl_visibility_appliance_sv3800_firmware:3.10</product> <product>ssl_visibility_appliance_sv3800_firmware:3.11</product> <product>ssl_visibility_appliance_sv3800_firmware:3.11.1.1</product> <product>ssl_visibility_appliance_sv3800_firmware:3.11.1.2</product> <product>ssl_visibility_appliance_sv3800_firmware:3.11.2.1</product> <product>ssl_visibility_appliance_sv800_firmware:3.8.4</product> <product>ssl_visibility_appliance_sv800_firmware:3.9</product> <product>ssl_visibility_appliance_sv800_firmware:3.10</product> <product>ssl_visibility_appliance_sv800_firmware:3.11</product> <product>ssl_visibility_appliance_sv800_firmware:3.11.1.1</product> <product>ssl_visibility_appliance_sv800_firmware:3.11.1.2</product> <product>ssl_visibility_appliance_sv800_firmware:3.11.2.1</product> </cve> <cve id="CVE-2016-10257" level="MEDIUM"> <product>advanced_secure_gateway:6.6</product> <product>proxysg:6.6</product> </cve> <cve id="CVE-2016-10256" level="MEDIUM"> <product>proxysg:6.6</product> </cve> <cve id="CVE-2016-10255" level="MEDIUM"> <product>elfutils:0.167</product> </cve> <cve id="CVE-2016-10254" level="MEDIUM"> <product>elfutils:0.167</product> </cve> <cve id="CVE-2016-10253" level="LOW"> <product>erlang%2fotp:18.0</product> <product>erlang%2fotp:18.0</product> <product>erlang%2fotp:18.0</product> <product>erlang%2fotp:18.0.1</product> <product>erlang%2fotp:18.0.2</product> <product>erlang%2fotp:18.0.3</product> <product>erlang%2fotp:18.1</product> <product>erlang%2fotp:18.1.1</product> <product>erlang%2fotp:18.1.2</product> <product>erlang%2fotp:18.1.3</product> <product>erlang%2fotp:18.1.4</product> <product>erlang%2fotp:18.1.5</product> <product>erlang%2fotp:18.2</product> <product>erlang%2fotp:18.2.1</product> <product>erlang%2fotp:18.2.2</product> <product>erlang%2fotp:18.2.3</product> <product>erlang%2fotp:18.2.4</product> <product>erlang%2fotp:18.2.4.1</product> <product>erlang%2fotp:18.3</product> <product>erlang%2fotp:18.3.1</product> <product>erlang%2fotp:18.3.2</product> <product>erlang%2fotp:18.3.3</product> <product>erlang%2fotp:18.3.4</product> <product>erlang%2fotp:18.3.4.1</product> <product>erlang%2fotp:18.3.4.2</product> <product>erlang%2fotp:18.3.4.3</product> <product>erlang%2fotp:18.3.4.4</product> <product>erlang%2fotp:18.3.4.5</product> <product>erlang%2fotp:19.0</product> <product>erlang%2fotp:19.0</product> <product>erlang%2fotp:19.0</product> <product>erlang%2fotp:19.0.1</product> <product>erlang%2fotp:19.0.2</product> <product>erlang%2fotp:19.0.3</product> <product>erlang%2fotp:19.0.4</product> <product>erlang%2fotp:19.0.5</product> <product>erlang%2fotp:19.0.6</product> <product>erlang%2fotp:19.0.7</product> <product>erlang%2fotp:19.1</product> <product>erlang%2fotp:19.1.1</product> <product>erlang%2fotp:19.1.2</product> <product>erlang%2fotp:19.1.3</product> <product>erlang%2fotp:19.1.4</product> <product>erlang%2fotp:19.1.5</product> <product>erlang%2fotp:19.1.6</product> <product>erlang%2fotp:19.1.6.1</product> <product>erlang%2fotp:19.2</product> <product>erlang%2fotp:19.2.1</product> <product>erlang%2fotp:19.2.2</product> <product>erlang%2fotp:19.2.3</product> <product>erlang%2fotp:19.2.3.1</product> <product>erlang%2fotp:19.3</product> <product>erlang%2fotp:19.3.1</product> <product>erlang%2fotp:19.3.2</product> <product>erlang%2fotp:19.3.3</product> <product>erlang%2fotp:19.3.4</product> <product>erlang%2fotp:19.3.5</product> <product>erlang%2fotp:19.3.6</product> <product>erlang%2fotp:19.3.6.1</product> <product>erlang%2fotp:19.3.6.2</product> <product>erlang%2fotp:19.3.6.3</product> <product>erlang%2fotp:19.3.6.4</product> <product>erlang%2fotp:19.3.6.5</product> <product>erlang%2fotp:19.3.6.6</product> <product>erlang%2fotp:19.3.6.7</product> <product>erlang%2fotp:19.3.6.8</product> <product>erlang%2fotp:19.3.6.9</product> </cve> <cve id="CVE-2016-10252" level="LOW"> <product>imagemagick:6.9.2-1</product> </cve> <cve id="CVE-2016-10251" level="MEDIUM"> <product>jasper:1.900.19</product> </cve> <cve id="CVE-2016-10250" level="LOW"> <product>jasper:1.900.12</product> </cve> <cve id="CVE-2016-10439" level="MEDIUM"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-7919" level="LOW"> <product>moodle:3.1.2</product> </cve> <cve id="CVE-2016-10433" level="MEDIUM"> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10432" level="MEDIUM"> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10431" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9650_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> </cve> <cve id="CVE-2016-10430" level="LOW"> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10437" level="LOW"> <product>fsm9055_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10436" level="LOW"> <product>fsm9055_firmware:-</product> <product>ipq4019_firmware:-</product> <product>ipq8064_firmware:-</product> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>qca4531_firmware:-</product> <product>qca9980_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10435" level="MEDIUM"> <product>mdm9206_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10434" level="LOW"> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-4059" level="MEDIUM"> <product>foxit_reader:7.3.0.118</product> <product>phantompdf:7.3.0.118</product> </cve> <cve id="CVE-2016-4058" level="MEDIUM"> <product>policy_center:v100r003c00</product> <product>policy_center:v100r003c10</product> </cve> <cve id="CVE-2016-4509" level="MEDIUM"> <product>elcsoft:2.4.01</product> </cve> <cve id="CVE-2016-4508" level="MEDIUM"> <product>bladecontrol-webvis:3.0.2</product> </cve> <cve id="CVE-2016-4507" level="LOW"> <product>bladecontrol-webvis:3.0.2</product> </cve> <cve id="CVE-2016-4506" level="MEDIUM"> <product>intuitive_650_tdb_controller:2.1</product> </cve> <cve id="CVE-2016-4505" level="LOW"> <product>intuitive_650_tdb_controller:2.1</product> </cve> <cve id="CVE-2016-4504" level="MEDIUM"> <product>weblog:-</product> <product>weblog:-</product> <product>weblog:-</product> <product>weblog:-</product> </cve> <cve id="CVE-2016-4503" level="LOW"> <product>device_server_web_console_5232-n_firmware:-</product> </cve> <cve id="CVE-2016-4502" level="LOW"> <product>esc_8832_data_controller:3.02</product> </cve> <cve id="CVE-2016-4501" level="LOW"> <product>esc_8832_data_controller:3.02</product> </cve> <cve id="CVE-2016-4500" level="HIGH"> <product>uc-7408_lx-plus:-</product> <product>uc-7408_lx-plus_firmware:-</product> </cve> <cve id="CVE-2016-8369" level="MEDIUM"> <product>jenesys_bas_bridge:1.1.8</product> </cve> <cve id="CVE-2016-8368" level="LOW"> <product>qj71e71-100_firmware:-</product> <product>qj71e71-b2_firmware:-</product> <product>qj71e71-b5_firmware:-</product> </cve> <cve id="CVE-2016-5900" level="MEDIUM"> <product>tealeaf_customer_experience_on_cloud_network_capture_add-on:16.1.01</product> </cve> <cve id="CVE-2016-8366" level="LOW"> <product>ilc_plcs_firmware:-</product> </cve> <cve id="CVE-2016-5902" level="MEDIUM"> <product>maximo_asset_management:7.1</product> <product>maximo_asset_management:7.5</product> <product>maximo_asset_management:7.6</product> <product>maximo_for_aviation:7.1</product> <product>maximo_for_aviation:7.5</product> <product>maximo_for_aviation:7.6</product> <product>maximo_for_energy_optimization:7.1</product> <product>maximo_for_energy_optimization:7.5</product> <product>maximo_for_energy_optimization:7.6</product> <product>maximo_for_government:7.1</product> <product>maximo_for_government:7.5</product> <product>maximo_for_government:7.6</product> <product>maximo_for_life_sciences:7.1</product> <product>maximo_for_life_sciences:7.5</product> <product>maximo_for_life_sciences:7.6</product> <product>maximo_for_nuclear_power:7.1</product> <product>maximo_for_nuclear_power:7.5</product> <product>maximo_for_nuclear_power:7.6</product> <product>maximo_for_oil_and_gas:7.1</product> <product>maximo_for_oil_and_gas:7.5</product> <product>maximo_for_oil_and_gas:7.6</product> <product>maximo_for_transportation:7.1</product> <product>maximo_for_transportation:7.5</product> <product>maximo_for_transportation:7.6</product> <product>maximo_for_utilities:7.1</product> <product>maximo_for_utilities:7.5</product> <product>maximo_for_utilities:7.6</product> </cve> <cve id="CVE-2016-8364" level="LOW"> <product>s7-softplc:4.12</product> </cve> <cve id="CVE-2016-8363" level="LOW"> <product>awk-1121_firmware:06-29-2017</product> <product>awk-1127_firmware:06-29-2017</product> <product>awk-1131a_firmware:10-31-2016</product> <product>awk-3121-m12-rtg_firmware:06-29-2017</product> <product>awk-3131-m12-rcc_firmware:06-29-2017</product> <product>awk-3131a_firmware:10-31-2016</product> <product>awk-3191_firmware:05-30-2017</product> <product>awk-4131a_firmware:10-31-2016</product> <product>awk-5232-m12-rcc_firmware:06-29-2017</product> <product>awk-5232_firmware:05-30-2017</product> <product>awk-6232_firmware:05-30-2017</product> <product>oncellg3470a-lte_firmware:10-31-2016</product> <product>wac-1001_v2_firmware:06-29-2017</product> <product>wac-2004_firmware:06-29-2017</product> </cve> <cve id="CVE-2016-5905" level="MEDIUM"> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> <product>maximo_asset_management:7.6.0.4</product> </cve> <cve id="CVE-2016-8361" level="LOW"> <product>jenesys_bas_bridge:1.1.8</product> </cve> <cve id="CVE-2016-8360" level="MEDIUM"> <product>softcms:1.5</product> </cve> <cve id="CVE-2016-2277" level="MEDIUM"> <product>integrated_architecture_builder:9.6.0.7</product> <product>integrated_architecture_builder:9.7.0.0</product> <product>integrated_architecture_builder:9.7.0.1</product> </cve> <cve id="CVE-2016-2275" level="LOW"> <product>vesp211-232_firmware:1.5.1</product> <product>vesp211-232_firmware:1.7.2</product> <product>vesp211-eu_firmware:1.7.2</product> </cve> <cve id="CVE-2016-2274" level="MEDIUM"> <product>a850_telemetry_gateway_base_station_firmware:-</product> </cve> <cve id="CVE-2016-2901" level="MEDIUM"> <product>web_content_manager</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-2272" level="LOW"> <product>eg2_web_control:4.04p</product> </cve> <cve id="CVE-2016-9018" level="MEDIUM"> <product>realplayer:18.1.5.705</product> </cve> <cve id="CVE-2016-9019" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-9016" level="LOW"> <product>firejail:0.9.38.4</product> </cve> <cve id="CVE-2016-9017" level="LOW"> <product>mujs:5c337af4b3df80cf967e4f9f6a21522de84b392a</product> </cve> <cve id="CVE-2016-9015" level="HIGH"> <product>urllib3:1.17</product> <product>urllib3:1.18</product> </cve> <cve id="CVE-2016-9012" level="LOW"> <product>cloudvision_portal:2016.1.2.0</product> </cve> <cve id="CVE-2016-2908" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-9010" level="MEDIUM"> <product>integration_bus:9.0</product> <product>integration_bus:10.0</product> <product>websphere_message_broker:8.0</product> </cve> <cve id="CVE-2016-9011" level="MEDIUM"> <product>libwmf:0.2.8.4</product> </cve> <cve id="CVE-2016-5678" level="LOW"> <product>nvrmini_2:1.0.0</product> <product>nvrmini_2:1.1.0</product> <product>nvrmini_2:1.3.0</product> <product>nvrmini_2:1.3.2</product> <product>nvrmini_2:1.4.0</product> <product>nvrmini_2:1.5.1</product> <product>nvrmini_2:1.5.2</product> <product>nvrmini_2:1.6.0</product> <product>nvrmini_2:1.6.1</product> <product>nvrmini_2:1.6.2</product> <product>nvrmini_2:1.6.4</product> <product>nvrmini_2:1.7.0</product> <product>nvrmini_2:1.7.1</product> <product>nvrmini_2:1.7.2</product> <product>nvrmini_2:1.7.5</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> <product>nvrsolo:1.0.0</product> <product>nvrsolo:1.0.1</product> <product>nvrsolo:1.1.0</product> <product>nvrsolo:1.1.0.117</product> <product>nvrsolo:1.1.1</product> <product>nvrsolo:1.1.2</product> <product>nvrsolo:1.2.0</product> <product>nvrsolo:1.3.0</product> <product>nvrsolo:1.75</product> <product>nvrsolo:2.0.0</product> <product>nvrsolo:2.0.1</product> <product>nvrsolo:2.1.5</product> <product>nvrsolo:2.2.2</product> <product>nvrsolo:2.3</product> <product>nvrsolo:2.3.1.20</product> <product>nvrsolo:2.3.7.9</product> <product>nvrsolo:2.3.7.10</product> <product>nvrsolo:2.3.9.6</product> <product>nvrsolo:3.0.0</product> </cve> <cve id="CVE-2016-5679" level="LOW"> <product>readynas_surveillance:1.1.2</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> </cve> <cve id="CVE-2016-5676" level="LOW"> <product>readynas_surveillance:1.1.1</product> <product>readynas_surveillance:1.1.2</product> <product>readynas_surveillance:1.2.0.4</product> <product>readynas_surveillance:1.3.2.4</product> <product>readynas_surveillance:1.3.2.14</product> <product>readynas_surveillance:1.4.0</product> <product>readynas_surveillance:1.4.1</product> <product>readynas_surveillance:1.4.2</product> <product>nvrmini_2:1.7.5</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> <product>nvrsolo:1.75</product> <product>nvrsolo:2.0.0</product> <product>nvrsolo:2.0.1</product> <product>nvrsolo:2.1.5</product> <product>nvrsolo:2.2.2</product> <product>nvrsolo:2.3</product> <product>nvrsolo:2.3.1.20</product> <product>nvrsolo:2.3.7.9</product> <product>nvrsolo:2.3.7.10</product> <product>nvrsolo:2.3.9.6</product> <product>nvrsolo:3.0.0</product> </cve> <cve id="CVE-2016-5677" level="LOW"> <product>readynas_surveillance:1.1.1</product> <product>readynas_surveillance:1.1.2</product> <product>readynas_surveillance:1.2.0.4</product> <product>readynas_surveillance:1.3.2.4</product> <product>readynas_surveillance:1.3.2.14</product> <product>readynas_surveillance:1.4.0</product> <product>readynas_surveillance:1.4.1</product> <product>readynas_surveillance:1.4.2</product> <product>nvrmini_2:1.7.5</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> <product>nvrsolo:1.0.0</product> <product>nvrsolo:1.0.1</product> <product>nvrsolo:1.1.0</product> <product>nvrsolo:1.1.0.117</product> <product>nvrsolo:1.1.1</product> <product>nvrsolo:1.1.2</product> <product>nvrsolo:1.2.0</product> <product>nvrsolo:1.3.0</product> <product>nvrsolo:1.75</product> <product>nvrsolo:2.0.0</product> <product>nvrsolo:2.0.1</product> <product>nvrsolo:2.1.5</product> <product>nvrsolo:2.2.2</product> <product>nvrsolo:2.3</product> <product>nvrsolo:2.3.1.20</product> <product>nvrsolo:2.3.7.9</product> <product>nvrsolo:2.3.7.10</product> <product>nvrsolo:2.3.9.6</product> <product>nvrsolo:3.0.0</product> </cve> <cve id="CVE-2016-5674" level="LOW"> <product>readynas_surveillance:1.1.1</product> <product>readynas_surveillance:1.1.2</product> <product>readynas_surveillance:1.2.0.4</product> <product>readynas_surveillance:1.3.2.4</product> <product>readynas_surveillance:1.3.2.14</product> <product>readynas_surveillance:1.4.0</product> <product>readynas_surveillance:1.4.1</product> <product>readynas_surveillance:1.4.2</product> <product>nvrmini_2:1.7.5</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> <product>nvrsolo:1.75</product> <product>nvrsolo:2.0.0</product> <product>nvrsolo:2.0.1</product> <product>nvrsolo:2.1.5</product> <product>nvrsolo:2.2.2</product> <product>nvrsolo:2.3</product> <product>nvrsolo:2.3.1.20</product> <product>nvrsolo:2.3.7.9</product> <product>nvrsolo:2.3.7.10</product> <product>nvrsolo:2.3.9.6</product> <product>nvrsolo:3.0.0</product> </cve> <cve id="CVE-2016-5675" level="LOW"> <product>readynas_surveillance:1.1.1</product> <product>readynas_surveillance:1.1.2</product> <product>readynas_surveillance:1.2.0.4</product> <product>readynas_surveillance:1.3.2.4</product> <product>readynas_surveillance:1.3.2.14</product> <product>readynas_surveillance:1.4.0</product> <product>readynas_surveillance:1.4.1</product> <product>readynas_surveillance:1.4.2</product> <product>crystal:2.2.1</product> <product>crystal:3.0.0</product> <product>crystal:3.1.0</product> <product>crystal:3.2.0</product> <product>nvrmini_2:1.7.5</product> <product>nvrmini_2:1.7.6</product> <product>nvrmini_2:2.0.0</product> <product>nvrmini_2:2.2.1</product> <product>nvrmini_2:3.0.0</product> <product>nvrsolo:1.0.0</product> <product>nvrsolo:1.0.1</product> <product>nvrsolo:1.1.0</product> <product>nvrsolo:1.1.0.117</product> <product>nvrsolo:1.1.1</product> <product>nvrsolo:1.1.2</product> <product>nvrsolo:1.2.0</product> <product>nvrsolo:1.3.0</product> <product>nvrsolo:1.75</product> <product>nvrsolo:2.0.0</product> <product>nvrsolo:2.0.1</product> <product>nvrsolo:2.1.5</product> <product>nvrsolo:2.2.2</product> <product>nvrsolo:2.3</product> <product>nvrsolo:2.3.1.20</product> <product>nvrsolo:2.3.7.9</product> <product>nvrsolo:2.3.7.10</product> <product>nvrsolo:2.3.9.6</product> <product>nvrsolo:3.0.0</product> </cve> <cve id="CVE-2016-5672" level="MEDIUM"> <product>crosswalk:19.49.514.4</product> </cve> <cve id="CVE-2016-5673" level="LOW"> <product>repeater:1201</product> </cve> <cve id="CVE-2016-5670" level="LOW"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-5671" level="MEDIUM"> <product>dm-txrx-100-str_firmware:1.2866.00026</product> </cve> <cve id="CVE-2016-3108" level="LOW"> <product>pulp:2.8.2-1</product> </cve> <cve id="CVE-2016-8235" level="LOW"> <product>customer_care_software_development_kit:2.0.16</product> </cve> <cve id="CVE-2016-6469" level="LOW"> <product>web_security_appliance:9.0.1-162</product> <product>web_security_appliance:9.1.1-074</product> </cve> <cve id="CVE-2016-8237" level="MEDIUM"> <product>updates:-</product> </cve> <cve id="CVE-2016-8231" level="LOW"> <product>lenovo_service_bridge:-</product> </cve> <cve id="CVE-2016-8230" level="LOW"> <product>lenovo_service_bridge:-</product> </cve> <cve id="CVE-2016-6462" level="LOW"> <product>email_security_appliance_firmware:9.7.1-06</product> <product>email_security_appliance_firmware:10.0.0-082</product> <product>email_security_appliance_firmware:10.0.0-125</product> </cve> <cve id="CVE-2016-8233" level="LOW"> <product>xclarity_administrator:1.2.1</product> </cve> <cve id="CVE-2016-3101" level="MEDIUM"> <product>extra_columns_plugin:1.16</product> </cve> <cve id="CVE-2016-6372" level="LOW"> <product>email_security_appliance:8.0.1-023</product> <product>email_security_appliance:8.0_base</product> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.1.1-000</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> <product>email_security_appliance:9.7.1-066</product> <product>email_security_appliance:9.9.6-026</product> <product>email_security_appliance:9.9_base</product> <product>web_security_appliance:5.6.0-623</product> <product>web_security_appliance:6.0.0-000</product> <product>web_security_appliance:7.1.0</product> <product>web_security_appliance:7.1.1</product> <product>web_security_appliance:7.1.2</product> <product>web_security_appliance:7.1.3</product> <product>web_security_appliance:7.1.4</product> <product>web_security_appliance:7.5.0-000</product> <product>web_security_appliance:7.5.0-825</product> <product>web_security_appliance:7.5.1-000</product> <product>web_security_appliance:7.5.2-000</product> <product>web_security_appliance:7.5.2-hp2-303</product> <product>web_security_appliance:7.7.0-000</product> <product>web_security_appliance:7.7.0-608</product> <product>web_security_appliance:7.7.1-000</product> <product>web_security_appliance:7.7.5-835</product> <product>web_security_appliance:8.0.0-000</product> <product>web_security_appliance:8.0.5</product> <product>web_security_appliance:8.0.6</product> <product>web_security_appliance:8.0.6-078</product> <product>web_security_appliance:8.0.6-119</product> <product>web_security_appliance:8.0.7</product> <product>web_security_appliance:8.0.7-142</product> <product>web_security_appliance:8.0.8-mr-113</product> <product>web_security_appliance:8.5.0-497</product> <product>web_security_appliance:8.5.0.000</product> <product>web_security_appliance:8.5.1-021</product> <product>web_security_appliance:8.5.2-024</product> <product>web_security_appliance:8.5.2-027</product> <product>web_security_appliance:8.5.3-055</product> <product>web_security_appliance:8.8.0-000</product> <product>web_security_appliance:8.8.0-085</product> <product>web_security_appliance:9.0.0-193</product> <product>web_security_appliance:9.0_base</product> <product>web_security_appliance:9.1.0-000</product> <product>web_security_appliance:9.1.0-070</product> <product>web_security_appliance:9.1_base</product> <product>web_security_appliance:9.5.0-235</product> <product>web_security_appliance:9.5.0-284</product> <product>web_security_appliance:9.5.0-444</product> <product>web_security_appliance:9.5_base</product> <product>web_security_appliance_8.0.5:hot_patch_1</product> </cve> <cve id="CVE-2016-6466" level="LOW"> <product>asr_5000_series_software:20.0.0</product> <product>asr_5000_series_software:20.0.2.3</product> <product>asr_5000_series_software:20.0.2.v1</product> <product>virtualized_packet_core:20.0_base</product> </cve> <cve id="CVE-2016-6370" level="LOW"> <product>hosted_collaboration_mediation_fulfillment:10.6%281%29_base</product> <product>hosted_collaboration_mediation_fulfillment:10.6%282%29_base</product> <product>hosted_collaboration_mediation_fulfillment:10.6%283%29_base</product> </cve> <cve id="CVE-2016-6371" level="LOW"> <product>hosted_collaboration_mediation_fulfillment:10.6%281%29_base</product> <product>hosted_collaboration_mediation_fulfillment:10.6%282%29_base</product> <product>hosted_collaboration_mediation_fulfillment:10.6%283%29_base</product> </cve> <cve id="CVE-2016-6376" level="LOW"> <product>wireless_lan_controller:3.0_base</product> <product>wireless_lan_controller:3.1.59.24</product> <product>wireless_lan_controller:3.1.105.0</product> <product>wireless_lan_controller:3.1.111.0</product> <product>wireless_lan_controller:3.2.78.0</product> <product>wireless_lan_controller:3.2.116.21</product> <product>wireless_lan_controller:3.2.150.6</product> <product>wireless_lan_controller:3.2.150.10</product> <product>wireless_lan_controller:3.2.171.5</product> <product>wireless_lan_controller:3.2.171.6</product> <product>wireless_lan_controller:3.2.185.0</product> <product>wireless_lan_controller:3.2.193.5</product> <product>wireless_lan_controller:3.2.195.10</product> <product>wireless_lan_controller:3.6.0e</product> <product>wireless_lan_controller:4.0.108</product> <product>wireless_lan_controller:4.0.155.0</product> <product>wireless_lan_controller:4.0.155.5</product> <product>wireless_lan_controller:4.0.179.8</product> <product>wireless_lan_controller:4.0.179.11</product> <product>wireless_lan_controller:4.0.196</product> <product>wireless_lan_controller:4.0.206.0</product> <product>wireless_lan_controller:4.0.217.0</product> <product>wireless_lan_controller:4.0.219.0</product> <product>wireless_lan_controller:4.1.171.0</product> <product>wireless_lan_controller:4.1.181.0</product> <product>wireless_lan_controller:4.1.185.0</product> <product>wireless_lan_controller:4.1_base</product> <product>wireless_lan_controller:4.2.61.0</product> <product>wireless_lan_controller:4.2.99.0</product> <product>wireless_lan_controller:4.2.112.0</product> <product>wireless_lan_controller:4.2.117.0</product> <product>wireless_lan_controller:4.2.130.0</product> <product>wireless_lan_controller:4.2.173.0</product> <product>wireless_lan_controller:4.2.174.0</product> <product>wireless_lan_controller:4.2.176.0</product> <product>wireless_lan_controller:4.2.182.0</product> <product>wireless_lan_controller:4.2_base</product> <product>wireless_lan_controller:5.0.148.0</product> <product>wireless_lan_controller:5.0.148.2</product> <product>wireless_lan_controller:5.1.151.0</product> <product>wireless_lan_controller:5.1.152.0</product> <product>wireless_lan_controller:5.1.160.0</product> <product>wireless_lan_controller:5.2.157.0</product> <product>wireless_lan_controller:5.2.169.0</product> <product>wireless_lan_controller:6.0_base</product> <product>wireless_lan_controller:7.0_base</product> <product>wireless_lan_controller:7.1_base</product> <product>wireless_lan_controller:7.2_base</product> <product>wireless_lan_controller:7.3.101.0</product> <product>wireless_lan_controller:7.3.103.8</product> <product>wireless_lan_controller:7.3.112</product> <product>wireless_lan_controller:7.3_base</product> <product>wireless_lan_controller:7.4.1.1</product> <product>wireless_lan_controller:7.4.100</product> <product>wireless_lan_controller:7.4.100.60</product> <product>wireless_lan_controller:7.4.110.0</product> <product>wireless_lan_controller:7.4.121.0</product> <product>wireless_lan_controller:7.4_base</product> <product>wireless_lan_controller:7.5.102.0</product> <product>wireless_lan_controller:7.5.102.11</product> <product>wireless_lan_controller:7.5_base</product> <product>wireless_lan_controller:7.6.1.62</product> <product>wireless_lan_controller:7.6.100.0</product> <product>wireless_lan_controller:7.6.110.0</product> <product>wireless_lan_controller:7.6.120.0</product> <product>wireless_lan_controller:7.6.130.0</product> <product>wireless_lan_controller:8.0.0</product> <product>wireless_lan_controller:8.0.0.30220.385</product> <product>wireless_lan_controller:8.0.72.140</product> <product>wireless_lan_controller:8.0.100</product> <product>wireless_lan_controller:8.0.115.0</product> <product>wireless_lan_controller:8.0.120.0</product> <product>wireless_lan_controller:8.0.121.0</product> <product>wireless_lan_controller:8.1.0</product> <product>wireless_lan_controller:8.1.104.37</product> <product>wireless_lan_controller:8.1.111.0</product> <product>wireless_lan_controller:8.1.122.0</product> <product>wireless_lan_controller:8.1.130.0</product> <product>wireless_lan_controller_6.0:182.0</product> <product>wireless_lan_controller_6.0:188.0</product> <product>wireless_lan_controller_6.0:196.0</product> <product>wireless_lan_controller_6.0:199.4</product> <product>wireless_lan_controller_6.0:202.0</product> <product>wireless_lan_controller_7.0:98.0</product> <product>wireless_lan_controller_7.0:98.218</product> <product>wireless_lan_controller_7.0:116.0</product> <product>wireless_lan_controller_7.0:220.0</product> <product>wireless_lan_controller_7.0:240.0</product> <product>wireless_lan_controller_7.0:250.0</product> <product>wireless_lan_controller_7.0:252.0</product> <product>wireless_lan_controller_7.1:91.0</product> <product>wireless_lan_controller_7.2:103.0</product> <product>wireless_lan_controller_7.4:1.19</product> <product>wireless_lan_controller_7.4:1.54</product> <product>wireless_lan_controller_7.4:140.0</product> </cve> <cve id="CVE-2016-6377" level="MEDIUM"> <product>media_origination_system_suite:2.3%281%29</product> <product>media_origination_system_suite:2.3%282%29</product> <product>media_origination_system_suite:2.3%286%29</product> <product>media_origination_system_suite:2.3%287%29</product> <product>media_origination_system_suite:2.3%288%29</product> <product>media_origination_system_suite:2.3_base</product> <product>media_origination_system_suite:2.4%281%29</product> <product>media_origination_system_suite:2.4_base</product> <product>media_origination_system_suite:2.5%280%29</product> <product>media_origination_system_suite:2.5%281%29</product> <product>media_origination_system_suite:2.5_base</product> <product>media_origination_system_suite:2.6_base</product> </cve> <cve id="CVE-2016-6374" level="LOW"> <product>cloud_services_platform_2100:2.0.0_base</product> </cve> <cve id="CVE-2016-3107" level="LOW"> <product>pulp:2.8.2-1</product> </cve> <cve id="CVE-2016-6464" level="LOW"> <product>unified_communications_manager_im_and_presence_service:10.5%281%29</product> <product>unified_communications_manager_im_and_presence_service:10.5%282%29</product> <product>unified_communications_manager_im_and_presence_service:11.0%281%29</product> <product>unified_communications_manager_im_and_presence_service:11.5%281%29</product> </cve> <cve id="CVE-2016-6465" level="MEDIUM"> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:9.7.2-047</product> <product>email_security_appliance:10.0.0-125</product> <product>email_security_appliance:10.0.0-232</product> </cve> <cve id="CVE-2016-0455" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-0106" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0457" level="LOW"> <product>e-business_suite:12.1</product> <product>e-business_suite:12.2</product> </cve> <cve id="CVE-2016-0104" level="HIGH"> <product>internet_explorer:10</product> </cve> <cve id="CVE-2016-0103" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0102" level="HIGH"> <product>edge</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-6598" level="LOW"> <product>track-it%21:11.4</product> <product>track-it%21:11.4</product> <product>track-it%21:11.4</product> </cve> <cve id="CVE-2016-6599" level="LOW"> <product>track-it%21:11.4</product> <product>track-it%21:11.4</product> <product>track-it%21:11.4</product> </cve> <cve id="CVE-2016-6597" level="LOW"> <product>mobile_control_eas_proxy:3.5.0.3</product> </cve> <cve id="CVE-2016-6594" level="LOW"> <product>advanced_secure_gateway:6.6</product> <product>cacheflow:3.4</product> <product>proxysg:6.5</product> <product>proxysg:6.6</product> </cve> <cve id="CVE-2016-6595" level="LOW"> <product>docker:1.12.0</product> </cve> <cve id="CVE-2016-8998" level="MEDIUM"> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-8999" level="MEDIUM"> <product>infosphere_datastage:8.7</product> <product>infosphere_datastage:9.1</product> <product>infosphere_datastage:11.3</product> <product>infosphere_datastage:11.5</product> <product>infosphere_information_server:8.7</product> <product>infosphere_information_server:9.1</product> <product>infosphere_information_server:11.3</product> <product>infosphere_information_server:11.5</product> <product>infosphere_information_server_on_cloud:11.5</product> </cve> <cve id="CVE-2016-8629" level="LOW"> <product>single_sign_on:7.1</product> <product>single_sign_on:7.2</product> </cve> <cve id="CVE-2016-8623" level="LOW"> <product>curl:6.0</product> <product>curl:6.1</product> <product>curl:6.1</product> <product>curl:6.2</product> <product>curl:6.3</product> <product>curl:6.3.1</product> <product>curl:6.4</product> <product>curl:6.5</product> <product>curl:6.5.1</product> <product>curl:6.5.2</product> <product>curl:7.1</product> <product>curl:7.1.1</product> <product>curl:7.2</product> <product>curl:7.2.1</product> <product>curl:7.3</product> <product>curl:7.4</product> <product>curl:7.4.1</product> <product>curl:7.4.2</product> <product>curl:7.5</product> <product>curl:7.5.1</product> <product>curl:7.5.2</product> <product>curl:7.6</product> <product>curl:7.6.1</product> <product>curl:7.7</product> <product>curl:7.7.1</product> <product>curl:7.7.2</product> <product>curl:7.7.3</product> <product>curl:7.8</product> <product>curl:7.8.1</product> <product>curl:7.9</product> <product>curl:7.9.1</product> <product>curl:7.9.2</product> <product>curl:7.9.3</product> <product>curl:7.9.4</product> <product>curl:7.9.5</product> <product>curl:7.9.6</product> <product>curl:7.9.7</product> <product>curl:7.9.8</product> <product>curl:7.10</product> <product>curl:7.10.1</product> <product>curl:7.10.2</product> <product>curl:7.10.3</product> <product>curl:7.10.4</product> <product>curl:7.10.5</product> <product>curl:7.10.6</product> <product>curl:7.10.7</product> <product>curl:7.10.8</product> <product>curl:7.11.0</product> <product>curl:7.11.1</product> <product>curl:7.11.2</product> <product>curl:7.12.0</product> <product>curl:7.12.1</product> <product>curl:7.12.2</product> <product>curl:7.12.3</product> <product>curl:7.13.0</product> <product>curl:7.13.1</product> <product>curl:7.13.2</product> <product>curl:7.14.0</product> <product>curl:7.14.1</product> <product>curl:7.15.0</product> <product>curl:7.15.1</product> <product>curl:7.15.2</product> <product>curl:7.15.3</product> <product>curl:7.15.4</product> <product>curl:7.15.5</product> <product>curl:7.16.0</product> <product>curl:7.16.1</product> <product>curl:7.16.2</product> <product>curl:7.16.3</product> <product>curl:7.16.4</product> <product>curl:7.17.0</product> <product>curl:7.17.1</product> <product>curl:7.18.0</product> <product>curl:7.18.1</product> <product>curl:7.18.2</product> <product>curl:7.19.0</product> <product>curl:7.19.1</product> <product>curl:7.19.2</product> <product>curl:7.19.3</product> <product>curl:7.19.4</product> <product>curl:7.19.5</product> <product>curl:7.19.6</product> <product>curl:7.19.7</product> <product>curl:7.20.0</product> <product>curl:7.20.1</product> <product>curl:7.21.0</product> <product>curl:7.21.1</product> <product>curl:7.21.2</product> <product>curl:7.21.3</product> <product>curl:7.21.4</product> <product>curl:7.21.5</product> <product>curl:7.21.6</product> <product>curl:7.21.7</product> <product>curl:7.22.0</product> <product>curl:7.23.0</product> <product>curl:7.23.1</product> <product>curl:7.24.0</product> <product>curl:7.25.0</product> <product>curl:7.26.0</product> <product>curl:7.27.0</product> <product>curl:7.28.0</product> <product>curl:7.28.1</product> <product>curl:7.29.0</product> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> </cve> <cve id="CVE-2016-8620" level="LOW"> <product>curl:6.0</product> <product>curl:6.1</product> <product>curl:6.1</product> <product>curl:6.2</product> <product>curl:6.3</product> <product>curl:6.3.1</product> <product>curl:6.4</product> <product>curl:6.5</product> <product>curl:6.5.1</product> <product>curl:6.5.2</product> <product>curl:7.1</product> <product>curl:7.1.1</product> <product>curl:7.2</product> <product>curl:7.2.1</product> <product>curl:7.3</product> <product>curl:7.4</product> <product>curl:7.4.1</product> <product>curl:7.4.2</product> <product>curl:7.5</product> <product>curl:7.5.1</product> <product>curl:7.5.2</product> <product>curl:7.6</product> <product>curl:7.6.1</product> <product>curl:7.7</product> <product>curl:7.7.1</product> <product>curl:7.7.2</product> <product>curl:7.7.3</product> <product>curl:7.8</product> <product>curl:7.8.1</product> <product>curl:7.9</product> <product>curl:7.9.1</product> <product>curl:7.9.2</product> <product>curl:7.9.3</product> <product>curl:7.9.4</product> <product>curl:7.9.5</product> <product>curl:7.9.6</product> <product>curl:7.9.7</product> <product>curl:7.9.8</product> <product>curl:7.10</product> <product>curl:7.10.1</product> <product>curl:7.10.2</product> <product>curl:7.10.3</product> <product>curl:7.10.4</product> <product>curl:7.10.5</product> <product>curl:7.10.6</product> <product>curl:7.10.7</product> <product>curl:7.10.8</product> <product>curl:7.11.0</product> <product>curl:7.11.1</product> <product>curl:7.11.2</product> <product>curl:7.12.0</product> <product>curl:7.12.1</product> <product>curl:7.12.2</product> <product>curl:7.12.3</product> <product>curl:7.13.0</product> <product>curl:7.13.1</product> <product>curl:7.13.2</product> <product>curl:7.14.0</product> <product>curl:7.14.1</product> <product>curl:7.15.0</product> <product>curl:7.15.1</product> <product>curl:7.15.2</product> <product>curl:7.15.3</product> <product>curl:7.15.4</product> <product>curl:7.15.5</product> <product>curl:7.16.0</product> <product>curl:7.16.1</product> <product>curl:7.16.2</product> <product>curl:7.16.3</product> <product>curl:7.16.4</product> <product>curl:7.17.0</product> <product>curl:7.17.1</product> <product>curl:7.18.0</product> <product>curl:7.18.1</product> <product>curl:7.18.2</product> <product>curl:7.19.0</product> <product>curl:7.19.1</product> <product>curl:7.19.2</product> <product>curl:7.19.3</product> <product>curl:7.19.4</product> <product>curl:7.19.5</product> <product>curl:7.19.6</product> <product>curl:7.19.7</product> <product>curl:7.20.0</product> <product>curl:7.20.1</product> <product>curl:7.21.0</product> <product>curl:7.21.1</product> <product>curl:7.21.2</product> <product>curl:7.21.3</product> <product>curl:7.21.4</product> <product>curl:7.21.5</product> <product>curl:7.21.6</product> <product>curl:7.21.7</product> <product>curl:7.22.0</product> <product>curl:7.23.0</product> <product>curl:7.23.1</product> <product>curl:7.24.0</product> <product>curl:7.25.0</product> <product>curl:7.26.0</product> <product>curl:7.27.0</product> <product>curl:7.28.0</product> <product>curl:7.28.1</product> <product>curl:7.29.0</product> <product>curl:7.30.0</product> <product>curl:7.31.0</product> <product>curl:7.32.0</product> <product>curl:7.33.0</product> <product>curl:7.34.0</product> <product>curl:7.35.0</product> <product>curl:7.36.0</product> <product>curl:7.37.0</product> <product>curl:7.37.1</product> <product>curl:7.38.0</product> <product>curl:7.39.0</product> <product>curl:7.40.0</product> <product>curl:7.41.0</product> <product>curl:7.42.0</product> <product>curl:7.42.1</product> <product>curl:7.43.0</product> <product>curl:7.44.0</product> <product>curl:7.45.0</product> <product>curl:7.46.0</product> <product>curl:7.47.0</product> <product>curl:7.47.1</product> <product>curl:7.48.0</product> <product>curl:7.49.0</product> <product>curl:7.49.1</product> <product>curl:7.50.0</product> <product>curl:7.50.1</product> <product>curl:7.50.2</product> <product>curl:7.50.3</product> </cve> <cve id="CVE-2016-8627" level="MEDIUM"> <product>jboss_enterprise_application_platform:6.4.0</product> <product>jboss_enterprise_application_platform:7.0.0</product> <product>jboss_enterprise_application_platform:7.1.0</product> <product>keycloak:-</product> </cve> <cve id="CVE-2016-10141" level="LOW"> <product>mujs:77ab465f1c394bb77f00966cd950650f3f53cb24</product> </cve> <cve id="CVE-2016-0437" level="MEDIUM"> <product>retail_applications:13.4</product> <product>retail_applications:14.0</product> <product>retail_applications:14.1</product> </cve> <cve id="CVE-2016-0436" level="MEDIUM"> <product>retail_applications:13.4</product> <product>retail_applications:14.0</product> <product>retail_applications:14.1</product> </cve> <cve id="CVE-2016-0435" level="MEDIUM"> <product>retail_applications:13.4</product> <product>retail_applications:14.0</product> <product>retail_applications:14.1</product> </cve> <cve id="CVE-2016-0434" level="MEDIUM"> <product>retail_applications:13.4</product> <product>retail_applications:14.0</product> <product>retail_applications:14.1</product> </cve> <cve id="CVE-2016-7421" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-7420" level="MEDIUM"> <product>crypto%2b%2b:5.6.4</product> </cve> <cve id="CVE-2016-7423" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-0430" level="MEDIUM"> <product>fusion_middleware:11.1.1.7.0</product> <product>fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-0439" level="LOW"> <product>fusion_middleware:11.1.1.7.0</product> <product>fusion_middleware:11.1.1.9</product> </cve> <cve id="CVE-2016-0438" level="MEDIUM"> <product>retail_applications:13.4</product> <product>retail_applications:14.0</product> <product>retail_applications:14.1</product> </cve> <cve id="CVE-2016-4994" level="MEDIUM"> <product>gimp:2.8.16</product> </cve> <cve id="CVE-2016-4331" level="MEDIUM"> <product>hdf5:1.8.16</product> </cve> <cve id="CVE-2016-4996" level="MEDIUM"> <product>satellite:6.0</product> </cve> <cve id="CVE-2016-4333" level="MEDIUM"> <product>hdf5:1.8.16</product> </cve> <cve id="CVE-2016-4334" level="MEDIUM"> <product>jive:2016.3</product> </cve> <cve id="CVE-2016-4335" level="MEDIUM"> <product>perceptive_document_filters:-</product> </cve> <cve id="CVE-2016-4336" level="LOW"> <product>perceptive_document_filters:-</product> </cve> <cve id="CVE-2016-4337" level="LOW"> <product>photostore:4.7.4</product> </cve> <cve id="CVE-2016-4338" level="MEDIUM"> <product>zabbix:2.0.0</product> <product>zabbix:2.0.1</product> <product>zabbix:2.0.2</product> <product>zabbix:2.0.3</product> <product>zabbix:2.0.4</product> <product>zabbix:2.0.5</product> <product>zabbix:2.0.6</product> <product>zabbix:2.0.7</product> <product>zabbix:2.0.8</product> <product>zabbix:2.0.9</product> <product>zabbix:2.0.10</product> <product>zabbix:2.0.11</product> <product>zabbix:2.0.12</product> <product>zabbix:2.0.13</product> <product>zabbix:2.0.14</product> <product>zabbix:2.0.15</product> <product>zabbix:2.0.16</product> <product>zabbix:2.0.17</product> <product>zabbix:2.2.0</product> <product>zabbix:2.2.1</product> <product>zabbix:2.2.2</product> <product>zabbix:2.2.3</product> <product>zabbix:2.2.4</product> <product>zabbix:2.2.5</product> <product>zabbix:2.2.6</product> <product>zabbix:2.2.7</product> <product>zabbix:2.2.8</product> <product>zabbix:2.2.9</product> <product>zabbix:2.2.10</product> <product>zabbix:2.2.11</product> <product>zabbix:2.2.12</product> <product>zabbix:3.0.0</product> <product>zabbix:3.0.2</product> </cve> <cve id="CVE-2016-1219" level="LOW"> <product>garoon:4.2.1</product> </cve> <cve id="CVE-2016-4999" level="LOW"> <product>dashbuilder:-</product> <product>jboss_bpm_suite:6.0.0</product> <product>jboss_bpm_suite:6.0.1</product> <product>jboss_bpm_suite:6.0.3</product> <product>jboss_bpm_suite:6.1</product> <product>jboss_bpm_suite:6.1.2</product> <product>jboss_enterprise_brms_platform:5.0.0</product> <product>jboss_enterprise_brms_platform:5.3.1</product> <product>jboss_enterprise_brms_platform:6.0.0</product> <product>jboss_enterprise_brms_platform:6.0.1</product> <product>jboss_enterprise_brms_platform:6.0.2</product> <product>jboss_enterprise_brms_platform:6.0.3</product> <product>jboss_enterprise_brms_platform:6.1</product> <product>jboss_enterprise_brms_platform:6.3</product> </cve> <cve id="CVE-2016-3524" level="LOW"> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-3525" level="HIGH"> <product>applications_manager:12.1.3</product> </cve> <cve id="CVE-2016-3526" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3527" level="LOW"> <product>demand_planning:12.1</product> <product>demand_planning:12.2</product> </cve> <cve id="CVE-2016-3520" level="LOW"> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-3522" level="LOW"> <product>web_applications_desktop_integrator:12.1.3</product> <product>web_applications_desktop_integrator:12.2.3</product> <product>web_applications_desktop_integrator:12.2.4</product> <product>web_applications_desktop_integrator:12.2.5</product> </cve> <cve id="CVE-2016-3523" level="MEDIUM"> <product>web_applications_desktop_integrator:12.1.3</product> <product>web_applications_desktop_integrator:12.2.3</product> <product>web_applications_desktop_integrator:12.2.4</product> <product>web_applications_desktop_integrator:12.2.5</product> </cve> <cve id="CVE-2016-3528" level="LOW"> <product>internet_expenses:12.1.1</product> <product>internet_expenses:12.1.2</product> <product>internet_expenses:12.1.3</product> <product>internet_expenses:12.2.3</product> <product>internet_expenses:12.2.4</product> <product>internet_expenses:12.2.5</product> </cve> <cve id="CVE-2016-3529" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-4591" level="LOW"> <product>webkit</product> </cve> <cve id="CVE-2016-0299" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-0298" level="LOW"> <product>security_guardium:10.0</product> </cve> <cve id="CVE-2016-0293" level="MEDIUM"> <product>bigfix_platform:9.0.5</product> <product>bigfix_platform:9.0.6</product> <product>bigfix_platform:9.0.7</product> <product>bigfix_platform:9.0.8</product> <product>bigfix_platform:9.1.3</product> <product>bigfix_platform:9.1.4</product> <product>bigfix_platform:9.1.5</product> <product>bigfix_platform:9.1.6</product> <product>bigfix_platform:9.1.7</product> <product>bigfix_platform:9.2.0</product> <product>bigfix_platform:9.2.1</product> <product>bigfix_platform:9.2.2</product> <product>bigfix_platform:9.2.3</product> <product>bigfix_platform:9.2.4</product> <product>bigfix_platform:9.2.5</product> <product>bigfix_platform:9.2.6</product> <product>bigfix_platform:9.2.7</product> </cve> <cve id="CVE-2016-0292" level="LOW"> <product>bigfix:9.0</product> <product>bigfix:9.1</product> <product>bigfix:9.2</product> <product>bigfix:9.5</product> </cve> <cve id="CVE-2016-0291" level="LOW"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.1.3</product> <product>bigfix_platform:9.1.4</product> <product>bigfix_platform:9.1.5</product> <product>bigfix_platform:9.1.6</product> <product>bigfix_platform:9.1.7</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.2.0</product> <product>bigfix_platform:9.2.1</product> <product>bigfix_platform:9.2.2</product> <product>bigfix_platform:9.2.3</product> <product>bigfix_platform:9.2.4</product> <product>bigfix_platform:9.2.5</product> <product>bigfix_platform:9.2.6</product> <product>bigfix_platform:9.2.7</product> </cve> <cve id="CVE-2016-0297" level="MEDIUM"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-0296" level="LOW"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-0295" level="MEDIUM"> <product>bigfix_platform:9.0</product> <product>bigfix_platform:9.1</product> <product>bigfix_platform:9.2</product> <product>bigfix_platform:9.5</product> </cve> <cve id="CVE-2016-9575" level="LOW"> <product>freeipa:4.2.0</product> <product>freeipa:4.2.0</product> <product>freeipa:4.2.1</product> <product>freeipa:4.2.2</product> <product>freeipa:4.2.3</product> <product>freeipa:4.2.4</product> <product>freeipa:4.3.0</product> <product>freeipa:4.3.1</product> <product>freeipa:4.3.2</product> <product>freeipa:4.4.0</product> <product>freeipa:4.4.1</product> <product>freeipa:4.4.2</product> </cve> <cve id="CVE-2016-9570" level="LOW"> <product>carbon_black:5.1.1.60603</product> </cve> <cve id="CVE-2016-2862" level="MEDIUM"> <product>websphere_commerce:6.0</product> <product>websphere_commerce:6.0.0.1</product> <product>websphere_commerce:6.0.0.2</product> <product>websphere_commerce:6.0.0.3</product> <product>websphere_commerce:6.0.0.4</product> <product>websphere_commerce:6.0.0.5</product> <product>websphere_commerce:6.0.0.6</product> <product>websphere_commerce:6.0.0.7</product> <product>websphere_commerce:6.0.0.8</product> <product>websphere_commerce:6.0.0.9</product> <product>websphere_commerce:6.0.0.10</product> <product>websphere_commerce:6.0.0.11</product> <product>websphere_commerce:7.0</product> <product>websphere_commerce:7.0.0.1</product> <product>websphere_commerce:7.0.0.2</product> <product>websphere_commerce:7.0.0.3</product> <product>websphere_commerce:7.0.0.4</product> <product>websphere_commerce:7.0.0.5</product> <product>websphere_commerce:7.0.0.6</product> <product>websphere_commerce:7.0.0.7</product> <product>websphere_commerce:7.0.0.8</product> <product>websphere_commerce:7.0.0.9</product> <product>websphere_commerce:8.0</product> <product>websphere_commerce:8.0.0.1</product> <product>websphere_commerce:8.0.0.2</product> <product>websphere_commerce:8.0.0.3</product> <product>websphere_commerce:8.0.0.4</product> </cve> <cve id="CVE-2016-5063" level="LOW"> <product>server_automation:8.6</product> <product>server_automation:8.7</product> </cve> <cve id="CVE-2016-5062" level="MEDIUM"> <product>aternity:9.0</product> </cve> <cve id="CVE-2016-5061" level="MEDIUM"> <product>aternity:9.0</product> </cve> <cve id="CVE-2016-5060" level="MEDIUM"> <product>ngrinder:3.3</product> </cve> <cve id="CVE-2016-5067" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5066" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5065" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5069" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-5068" level="LOW"> <product>aleos_firmware:4.3.2</product> </cve> <cve id="CVE-2016-2863" level="MEDIUM"> <product>websphere_commerce:7.0</product> <product>websphere_commerce:8.0</product> <product>websphere_commerce:8.0.0.1</product> <product>websphere_commerce:8.0.0.2</product> <product>websphere_commerce:8.0.0.3</product> <product>websphere_commerce:8.0.0.5</product> <product>websphere_commerce:8.0.0.6</product> <product>websphere_commerce:8.0.0.7</product> <product>websphere_commerce:8.0.0.8</product> <product>websphere_commerce:8.0.0.9</product> </cve> <cve id="CVE-2016-9711" level="LOW"> <product>cognos_analytics:11.0.0.0</product> </cve> <cve id="CVE-2016-9710" level="LOW"> <product>cognos_business_intelligence_server:10.1.1</product> <product>cognos_business_intelligence_server:10.2.0</product> <product>cognos_business_intelligence_server:10.2.1</product> <product>cognos_business_intelligence_server:10.2.1.1</product> <product>cognos_business_intelligence_server:10.2.2</product> </cve> <cve id="CVE-2016-9715" level="MEDIUM"> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-9714" level="MEDIUM"> <product>infosphere_master_data_management_server:10.1</product> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-9717" level="LOW"> <product>infosphere_master_data_management_server:10.1</product> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-9716" level="MEDIUM"> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-9719" level="MEDIUM"> <product>infosphere_master_data_management_server:10.1</product> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-9718" level="MEDIUM"> <product>infosphere_master_data_management_server:10.1</product> <product>infosphere_master_data_management_server:11.0</product> <product>infosphere_master_data_management_server:11.3</product> <product>infosphere_master_data_management_server:11.4</product> <product>infosphere_master_data_management_server:11.5</product> <product>infosphere_master_data_management_server:11.6</product> </cve> <cve id="CVE-2016-4196" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4197" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4191" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4192" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4193" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-5249" level="LOW"> <product>solution_center:3.3.002</product> </cve> <cve id="CVE-2016-5248" level="LOW"> <product>solution_center:3.3.002</product> </cve> <cve id="CVE-2016-5247" level="LOW"> <product>bios:-</product> </cve> <cve id="CVE-2016-5242" level="MEDIUM"> <product>xen:4.4.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-5241" level="MEDIUM"> <product>graphicsmagick:1.3.23</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5240" level="MEDIUM"> <product>graphicsmagick:1.3.23</product> </cve> <cve id="CVE-2016-2861" level="MEDIUM"> <product>websphere_extreme_scale:7.1.0</product> <product>websphere_extreme_scale:7.1.0.2</product> <product>websphere_extreme_scale:7.1.1</product> <product>websphere_extreme_scale:8.5.0</product> <product>websphere_extreme_scale:8.5.0.1</product> <product>websphere_extreme_scale:8.5.0.2</product> <product>websphere_extreme_scale:8.6.0</product> <product>websphere_extreme_scale:8.6.0.0</product> <product>websphere_extreme_scale:8.6.0.1</product> <product>websphere_extreme_scale:8.6.0.2</product> <product>websphere_extreme_scale:8.6.0.3</product> <product>websphere_extreme_scale:8.6.0.4</product> <product>websphere_extreme_scale:8.6.0.5</product> <product>websphere_extreme_scale:8.6.0.6</product> <product>websphere_extreme_scale:8.6.0.7</product> </cve> <cve id="CVE-2016-7976" level="MEDIUM"> <product>ghostscript:9.18</product> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-7975" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-7974" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-6484" level="MEDIUM"> <product>netmri:7.0.1</product> </cve> <cve id="CVE-2016-2864" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-7973" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-2048" level="MEDIUM"> <product>django:1.9</product> <product>django:1.9.1</product> </cve> <cve id="CVE-2016-2049" level="MEDIUM"> <product>php-openid</product> </cve> <cve id="CVE-2016-2040" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2041" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2042" level="LOW"> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2043" level="MEDIUM"> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> <product>leap:42.1</product> <product>opensuse:13.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-2044" level="LOW"> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2045" level="MEDIUM"> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2046" level="MEDIUM"> <product>unified_threat_management_software:9.351</product> </cve> <cve id="CVE-2016-7972" level="LOW"> <product>libass:0.13.3</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-6293" level="LOW"> <product>international_components_for_unicode:57.1</product> </cve> <cve id="CVE-2016-6299" level="MEDIUM"> <product>scm_plugin:-</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-6298" level="MEDIUM"> <product>jwcrypto:0.3.1</product> </cve> <cve id="CVE-2016-7970" level="LOW"> <product>libass:0.13.3</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-6413" level="LOW"> <product>application_policy_infrastructure_controller:1.3%282f%29</product> </cve> <cve id="CVE-2016-6129" level="LOW"> <product>libtomcrypt:1.17</product> <product>op-tee_os:2.1.0</product> </cve> <cve id="CVE-2016-6127" level="MEDIUM"> <product>request_tracker:4.0.0</product> <product>request_tracker:4.0.1</product> <product>request_tracker:4.0.2</product> <product>request_tracker:4.0.3</product> <product>request_tracker:4.0.4</product> <product>request_tracker:4.0.5</product> <product>request_tracker:4.0.6</product> <product>request_tracker:4.0.7</product> <product>request_tracker:4.0.8</product> <product>request_tracker:4.0.9</product> <product>request_tracker:4.0.10</product> <product>request_tracker:4.0.11</product> <product>request_tracker:4.0.12</product> <product>request_tracker:4.0.13</product> <product>request_tracker:4.0.14</product> <product>request_tracker:4.0.15</product> <product>request_tracker:4.0.16</product> <product>request_tracker:4.0.17</product> <product>request_tracker:4.0.18</product> <product>request_tracker:4.0.19</product> <product>request_tracker:4.0.20</product> <product>request_tracker:4.0.21</product> <product>request_tracker:4.0.22</product> <product>request_tracker:4.0.23</product> <product>request_tracker:4.0.24</product> <product>request_tracker:4.2.0</product> <product>request_tracker:4.2.1</product> <product>request_tracker:4.2.2</product> <product>request_tracker:4.2.3</product> <product>request_tracker:4.2.4</product> <product>request_tracker:4.2.5</product> <product>request_tracker:4.2.6</product> <product>request_tracker:4.2.7</product> <product>request_tracker:4.2.8</product> <product>request_tracker:4.2.9</product> <product>request_tracker:4.2.10</product> <product>request_tracker:4.2.11</product> <product>request_tracker:4.2.12</product> <product>request_tracker:4.2.13</product> <product>request_tracker:4.4.0</product> <product>request_tracker:4.4.1</product> </cve> <cve id="CVE-2016-6126" level="LOW"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-6125" level="MEDIUM"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-6124" level="LOW"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-6123" level="MEDIUM"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-6122" level="LOW"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-6121" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.2.16</product> <product>emptoris_strategic_supply_management:10.0.2.17</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.0.11</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> <product>emptoris_supplier_lifecycle_management:10.0.0.0</product> <product>emptoris_supplier_lifecycle_management:10.0.0.1</product> <product>emptoris_supplier_lifecycle_management:10.0.0.2</product> <product>emptoris_supplier_lifecycle_management:10.0.0.3</product> <product>emptoris_supplier_lifecycle_management:10.0.1.0</product> <product>emptoris_supplier_lifecycle_management:10.0.1.1</product> <product>emptoris_supplier_lifecycle_management:10.0.1.2</product> <product>emptoris_supplier_lifecycle_management:10.0.2.0</product> <product>emptoris_supplier_lifecycle_management:10.0.2.2</product> <product>emptoris_supplier_lifecycle_management:10.0.2.3</product> <product>emptoris_supplier_lifecycle_management:10.0.2.5</product> <product>emptoris_supplier_lifecycle_management:10.0.2.6</product> <product>emptoris_supplier_lifecycle_management:10.0.2.7</product> </cve> <cve id="CVE-2016-0358" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-0359" level="MEDIUM"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-0353" level="MEDIUM"> <product>security_privileged_identity_manager:2.0.0</product> <product>security_privileged_identity_manager:2.0.1</product> <product>security_privileged_identity_manager:2.0.2</product> </cve> <cve id="CVE-2016-0350" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-0351" level="MEDIUM"> <product>security_identity_manager_virtual_appliance:7.0.0.0</product> <product>security_identity_manager_virtual_appliance:7.0.0.1</product> <product>security_identity_manager_virtual_appliance:7.0.0.2</product> <product>security_identity_manager_virtual_appliance:7.0.0.3</product> <product>security_identity_manager_virtual_appliance:7.0.1.0</product> <product>security_identity_manager_virtual_appliance:7.0.1.1</product> <product>security_identity_manager_virtual_appliance:7.0.1.3</product> </cve> <cve id="CVE-2016-0356" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-0357" level="MEDIUM"> <product>security_identity_manager_adapter:7.0.0.0</product> <product>security_identity_manager_adapter:7.0.0.1</product> <product>security_identity_manager_adapter:7.0.0.2</product> <product>security_identity_manager_adapter:7.0.0.3</product> <product>security_identity_manager_adapter:7.0.1.0</product> <product>security_identity_manager_adapter:7.0.1.1</product> </cve> <cve id="CVE-2016-0354" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-0355" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-9962" level="MEDIUM"> <product>docker:1.11.0</product> <product>docker:1.11.1</product> <product>docker:1.11.2</product> <product>docker:1.12.0</product> <product>docker:1.12.1</product> <product>docker:1.12.2</product> <product>docker:1.12.3</product> <product>docker:1.12.4</product> <product>docker:1.12.5</product> </cve> <cve id="CVE-2016-9960" level="LOW"> <product>game-music-emu:0.6.0</product> <product>fedora:24</product> <product>fedora:25</product> <product>suse_linux_enterprise_desktop:12.0</product> <product>suse_linux_enterprise_desktop:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_software_development_kit:12.0</product> <product>suse_linux_enterprise_software_development_kit:12.0</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9961" level="LOW"> <product>game-music-emu:0.6.0</product> <product>fedora:24</product> <product>fedora:25</product> <product>suse_linux_enterprise_desktop:12.0</product> <product>suse_linux_enterprise_desktop:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_server:12.0</product> <product>suse_linux_enterprise_software_development_kit:12.0</product> <product>suse_linux_enterprise_software_development_kit:12.0</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-9966" level="LOW"> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> <product>samsung_mobile:7.0</product> </cve> <cve id="CVE-2016-9967" level="LOW"> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> <product>samsung_mobile:7.0</product> </cve> <cve id="CVE-2016-9965" level="LOW"> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> <product>samsung_mobile:6.0</product> <product>samsung_mobile:7.0</product> </cve> <cve id="CVE-2016-4330" level="MEDIUM"> <product>hdf5:1.8.16</product> </cve> <cve id="CVE-2016-4298" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4296" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4295" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4294" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4293" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4292" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4291" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-4290" level="MEDIUM"> <product>hancom_office_2014:9.1.0.2176</product> </cve> <cve id="CVE-2016-3959" level="LOW"> <product>go:1.5</product> <product>go:1.6</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-3958" level="LOW"> <product>go:1.5</product> <product>go:1.6</product> </cve> <cve id="CVE-2016-3954" level="LOW"> <product>web2py:1.76.1</product> <product>web2py:1.76.2</product> <product>web2py:1.76.3</product> <product>web2py:1.76.4</product> <product>web2py:1.76.5</product> <product>web2py:1.77.1</product> <product>web2py:1.77.2</product> <product>web2py:1.77.3</product> <product>web2py:1.78.1</product> <product>web2py:1.78.3</product> <product>web2py:1.79.1</product> <product>web2py:1.79.2</product> <product>web2py:1.80.1</product> <product>web2py:1.81.1</product> <product>web2py:1.81.2</product> <product>web2py:1.81.3</product> <product>web2py:1.81.4</product> <product>web2py:1.81.5</product> <product>web2py:1.82.1</product> <product>web2py:1.83.1</product> <product>web2py:1.83.2</product> <product>web2py:1.84.1</product> <product>web2py:1.84.4</product> <product>web2py:1.85.1</product> <product>web2py:1.85.3</product> <product>web2py:1.86.1</product> <product>web2py:1.86.3</product> <product>web2py:1.87.1</product> <product>web2py:1.87.2</product> <product>web2py:1.87.3</product> <product>web2py:1.88.1</product> <product>web2py:1.89.1</product> <product>web2py:1.89.5</product> <product>web2py:1.90.1</product> <product>web2py:1.90.2</product> <product>web2py:1.90.4</product> <product>web2py:1.90.5</product> <product>web2py:1.90.6</product> <product>web2py:1.91.1</product> <product>web2py:1.91.2</product> <product>web2py:1.91.5</product> <product>web2py:1.91.6</product> <product>web2py:1.92.1</product> <product>web2py:1.93.1</product> <product>web2py:1.93.2</product> <product>web2py:1.94.1</product> <product>web2py:1.94.2</product> <product>web2py:1.94.3</product> <product>web2py:1.94.4</product> <product>web2py:1.94.5</product> <product>web2py:1.94.6</product> <product>web2py:1.95.1</product> <product>web2py:1.96.1</product> <product>web2py:1.96.2</product> <product>web2py:1.96.4</product> <product>web2py:1.97.1</product> <product>web2py:1.98.1</product> <product>web2py:1.98.2</product> <product>web2py:1.99.1</product> <product>web2py:1.99.2</product> <product>web2py:1.99.3</product> <product>web2py:1.99.4</product> <product>web2py:1.99.5</product> <product>web2py:1.99.7</product> <product>web2py:2.0.1-11</product> <product>web2py:2.1.0</product> <product>web2py:2.2.1</product> <product>web2py:2.3.1</product> </cve> <cve id="CVE-2016-3957" level="LOW"> <product>web2py:1.76.1</product> <product>web2py:1.76.2</product> <product>web2py:1.76.3</product> <product>web2py:1.76.4</product> <product>web2py:1.76.5</product> <product>web2py:1.77.1</product> <product>web2py:1.77.2</product> <product>web2py:1.77.3</product> <product>web2py:1.78.1</product> <product>web2py:1.78.3</product> <product>web2py:1.79.1</product> <product>web2py:1.79.2</product> <product>web2py:1.80.1</product> <product>web2py:1.81.1</product> <product>web2py:1.81.2</product> <product>web2py:1.81.3</product> <product>web2py:1.81.4</product> <product>web2py:1.81.5</product> <product>web2py:1.82.1</product> <product>web2py:1.83.1</product> <product>web2py:1.83.2</product> <product>web2py:1.84.1</product> <product>web2py:1.84.4</product> <product>web2py:1.85.1</product> <product>web2py:1.85.3</product> <product>web2py:1.86.1</product> <product>web2py:1.86.3</product> <product>web2py:1.87.1</product> <product>web2py:1.87.2</product> <product>web2py:1.87.3</product> <product>web2py:1.88.1</product> <product>web2py:1.89.1</product> <product>web2py:1.89.5</product> <product>web2py:1.90.1</product> <product>web2py:1.90.2</product> <product>web2py:1.90.4</product> <product>web2py:1.90.5</product> <product>web2py:1.90.6</product> <product>web2py:1.91.1</product> <product>web2py:1.91.2</product> <product>web2py:1.91.5</product> <product>web2py:1.91.6</product> <product>web2py:1.92.1</product> <product>web2py:1.93.1</product> <product>web2py:1.93.2</product> <product>web2py:1.94.1</product> <product>web2py:1.94.2</product> <product>web2py:1.94.3</product> <product>web2py:1.94.4</product> <product>web2py:1.94.5</product> <product>web2py:1.94.6</product> <product>web2py:1.95.1</product> <product>web2py:1.96.1</product> <product>web2py:1.96.2</product> <product>web2py:1.96.4</product> <product>web2py:1.97.1</product> <product>web2py:1.98.1</product> <product>web2py:1.98.2</product> <product>web2py:1.99.1</product> <product>web2py:1.99.2</product> <product>web2py:1.99.3</product> <product>web2py:1.99.4</product> <product>web2py:1.99.5</product> <product>web2py:1.99.7</product> <product>web2py:2.0.1-11</product> <product>web2py:2.1.0</product> <product>web2py:2.2.1</product> <product>web2py:2.3.1</product> </cve> <cve id="CVE-2016-3956" level="LOW"> <product>sdk:1.1.0.20</product> <product>sdk:1.2.0.10</product> <product>sdk:4.4.1.0</product> <product>node.js:0.10.0</product> <product>node.js:0.10.1</product> <product>node.js:0.10.2</product> <product>node.js:0.10.3</product> <product>node.js:0.10.4</product> <product>node.js:0.10.5</product> <product>node.js:0.10.6</product> <product>node.js:0.10.7</product> <product>node.js:0.10.8</product> <product>node.js:0.10.9</product> <product>node.js:0.10.10</product> <product>node.js:0.10.11</product> <product>node.js:0.10.12</product> <product>node.js:0.10.13</product> <product>node.js:0.10.14</product> <product>node.js:0.10.15</product> <product>node.js:0.10.16</product> <product>node.js:0.10.16-isaacs-manual</product> <product>node.js:0.10.17</product> <product>node.js:0.10.18</product> <product>node.js:0.10.19</product> <product>node.js:0.10.20</product> <product>node.js:0.10.21</product> <product>node.js:0.10.22</product> <product>node.js:0.10.23</product> <product>node.js:0.10.24</product> <product>node.js:0.10.25</product> <product>node.js:0.10.26</product> <product>node.js:0.10.27</product> <product>node.js:0.10.28</product> <product>node.js:0.10.29</product> <product>node.js:0.10.30</product> <product>node.js:0.10.31</product> <product>node.js:0.10.32</product> <product>node.js:0.10.33</product> <product>node.js:0.10.34</product> <product>node.js:0.10.35</product> <product>node.js:0.10.36</product> <product>node.js:0.10.37</product> <product>node.js:0.10.38</product> <product>node.js:0.10.39</product> <product>node.js:0.10.40</product> <product>node.js:0.10.41</product> <product>node.js:0.12.0</product> <product>node.js:0.12.1</product> <product>node.js:0.12.2</product> <product>node.js:0.12.3</product> <product>node.js:0.12.4</product> <product>node.js:0.12.5</product> <product>node.js:0.12.6</product> <product>node.js:0.12.7</product> <product>node.js:0.12.8</product> <product>node.js:0.12.9</product> <product>node.js:4.0.0</product> <product>node.js:4.1.0</product> <product>node.js:4.1.1</product> <product>node.js:4.1.2</product> <product>node.js:4.2.0</product> <product>node.js:4.2.1</product> <product>node.js:4.2.2</product> <product>node.js:4.2.3</product> <product>node.js:4.2.4</product> <product>node.js:4.2.5</product> <product>node.js:4.2.6</product> <product>node.js:4.3.0</product> <product>node.js:4.3.1</product> <product>node.js:4.3.1</product> <product>node.js:4.3.1</product> <product>node.js:4.3.2</product> <product>node.js:4.4.0</product> <product>node.js:4.4.0</product> <product>node.js:4.4.0</product> <product>node.js:4.4.0</product> <product>node.js:4.4.0</product> <product>node.js:4.4.1</product> <product>node.js:5.0.0</product> <product>node.js:5.1.0</product> <product>node.js:5.1.1</product> <product>node.js:5.2.0</product> <product>node.js:5.3.0</product> <product>node.js:5.4.0</product> <product>node.js:5.4.1</product> <product>node.js:5.5.0</product> <product>node.js:5.6.0</product> <product>node.js:5.7.0</product> <product>node.js:5.7.1</product> <product>node.js:5.8.0</product> <product>node.js:5.8.1</product> <product>node.js:5.9.0</product> <product>node.js:5.9.1</product> <product>npm:2.15.0</product> <product>npm:3.0.0</product> <product>npm:3.1.0</product> <product>npm:3.1.1</product> <product>npm:3.1.2</product> <product>npm:3.1.3</product> <product>npm:3.2.0</product> <product>npm:3.2.1</product> <product>npm:3.2.2</product> <product>npm:3.3.0</product> <product>npm:3.3.1</product> <product>npm:3.3.2</product> <product>npm:3.3.3</product> <product>npm:3.3.4</product> <product>npm:3.3.5</product> <product>npm:3.3.6</product> <product>npm:3.3.7</product> <product>npm:3.3.8</product> <product>npm:3.3.9</product> <product>npm:3.3.10</product> <product>npm:3.3.11</product> <product>npm:3.3.12</product> <product>npm:3.4.0</product> <product>npm:3.4.1</product> <product>npm:3.5.0</product> <product>npm:3.5.1</product> <product>npm:3.5.2</product> <product>npm:3.5.3</product> <product>npm:3.5.4</product> <product>npm:3.6.0</product> <product>npm:3.7.0</product> <product>npm:3.7.1</product> <product>npm:3.7.2</product> <product>npm:3.7.3</product> <product>npm:3.7.4</product> <product>npm:3.7.5</product> <product>npm:3.8.0</product> <product>npm:3.8.1</product> <product>npm:3.8.2</product> </cve> <cve id="CVE-2016-3950" level="LOW"> <product>ar3200_firmware:v200r005c20</product> <product>ar3200_firmware:v200r005c30</product> <product>ar3200_firmware:v200r005c32</product> </cve> <cve id="CVE-2016-3953" level="LOW"> <product>web2py:1.76.1</product> <product>web2py:1.76.2</product> <product>web2py:1.76.3</product> <product>web2py:1.76.4</product> <product>web2py:1.76.5</product> <product>web2py:1.77.1</product> <product>web2py:1.77.2</product> <product>web2py:1.77.3</product> <product>web2py:1.78.1</product> <product>web2py:1.78.3</product> <product>web2py:1.79.1</product> <product>web2py:1.79.2</product> <product>web2py:1.80.1</product> <product>web2py:1.81.1</product> <product>web2py:1.81.2</product> <product>web2py:1.81.3</product> <product>web2py:1.81.4</product> <product>web2py:1.81.5</product> <product>web2py:1.82.1</product> <product>web2py:1.83.1</product> <product>web2py:1.83.2</product> <product>web2py:1.84.1</product> <product>web2py:1.84.4</product> <product>web2py:1.85.1</product> <product>web2py:1.85.3</product> <product>web2py:1.86.1</product> <product>web2py:1.86.3</product> <product>web2py:1.87.1</product> <product>web2py:1.87.2</product> <product>web2py:1.87.3</product> <product>web2py:1.88.1</product> <product>web2py:1.89.1</product> <product>web2py:1.89.5</product> <product>web2py:1.90.1</product> <product>web2py:1.90.2</product> <product>web2py:1.90.4</product> <product>web2py:1.90.5</product> <product>web2py:1.90.6</product> <product>web2py:1.91.1</product> <product>web2py:1.91.2</product> <product>web2py:1.91.5</product> <product>web2py:1.91.6</product> <product>web2py:1.92.1</product> <product>web2py:1.93.1</product> <product>web2py:1.93.2</product> <product>web2py:1.94.1</product> <product>web2py:1.94.2</product> <product>web2py:1.94.3</product> <product>web2py:1.94.4</product> <product>web2py:1.94.5</product> <product>web2py:1.94.6</product> <product>web2py:1.95.1</product> <product>web2py:1.96.1</product> <product>web2py:1.96.2</product> <product>web2py:1.96.4</product> <product>web2py:1.97.1</product> <product>web2py:1.98.1</product> <product>web2py:1.98.2</product> <product>web2py:1.99.1</product> <product>web2py:1.99.2</product> <product>web2py:1.99.3</product> <product>web2py:1.99.4</product> <product>web2py:1.99.5</product> <product>web2py:1.99.7</product> <product>web2py:2.0.1-11</product> <product>web2py:2.1.0</product> <product>web2py:2.2.1</product> <product>web2py:2.3.1</product> </cve> <cve id="CVE-2016-3952" level="LOW"> <product>web2py:1.76.1</product> <product>web2py:1.76.2</product> <product>web2py:1.76.3</product> <product>web2py:1.76.4</product> <product>web2py:1.76.5</product> <product>web2py:1.77.1</product> <product>web2py:1.77.2</product> <product>web2py:1.77.3</product> <product>web2py:1.78.1</product> <product>web2py:1.78.3</product> <product>web2py:1.79.1</product> <product>web2py:1.79.2</product> <product>web2py:1.80.1</product> <product>web2py:1.81.1</product> <product>web2py:1.81.2</product> <product>web2py:1.81.3</product> <product>web2py:1.81.4</product> <product>web2py:1.81.5</product> <product>web2py:1.82.1</product> <product>web2py:1.83.1</product> <product>web2py:1.83.2</product> <product>web2py:1.84.1</product> <product>web2py:1.84.4</product> <product>web2py:1.85.1</product> <product>web2py:1.85.3</product> <product>web2py:1.86.1</product> <product>web2py:1.86.3</product> <product>web2py:1.87.1</product> <product>web2py:1.87.2</product> <product>web2py:1.87.3</product> <product>web2py:1.88.1</product> <product>web2py:1.89.1</product> <product>web2py:1.89.5</product> <product>web2py:1.90.1</product> <product>web2py:1.90.2</product> <product>web2py:1.90.4</product> <product>web2py:1.90.5</product> <product>web2py:1.90.6</product> <product>web2py:1.91.1</product> <product>web2py:1.91.2</product> <product>web2py:1.91.5</product> <product>web2py:1.91.6</product> <product>web2py:1.92.1</product> <product>web2py:1.93.1</product> <product>web2py:1.93.2</product> <product>web2py:1.94.1</product> <product>web2py:1.94.2</product> <product>web2py:1.94.3</product> <product>web2py:1.94.4</product> <product>web2py:1.94.5</product> <product>web2py:1.94.6</product> <product>web2py:1.95.1</product> <product>web2py:1.96.1</product> <product>web2py:1.96.2</product> <product>web2py:1.96.4</product> <product>web2py:1.97.1</product> <product>web2py:1.98.1</product> <product>web2py:1.98.2</product> <product>web2py:1.99.1</product> <product>web2py:1.99.2</product> <product>web2py:1.99.3</product> <product>web2py:1.99.4</product> <product>web2py:1.99.5</product> <product>web2py:1.99.7</product> <product>web2py:2.0.1-11</product> <product>web2py:2.1.0</product> <product>web2py:2.2.1</product> <product>web2py:2.3.1</product> </cve> <cve id="CVE-2016-9388" level="MEDIUM"> <product>jasper:1.900.14</product> </cve> <cve id="CVE-2016-9389" level="LOW"> <product>jasper:1.900.13</product> </cve> <cve id="CVE-2016-9386" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen</product> </cve> <cve id="CVE-2016-9387" level="MEDIUM"> <product>jasper:1.900.12</product> </cve> <cve id="CVE-2016-9384" level="LOW"> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9385" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.5.5</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.6.4</product> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9382" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen:4.0.0</product> <product>xen:4.0.1</product> <product>xen:4.0.2</product> <product>xen:4.0.3</product> <product>xen:4.0.4</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.1.6.1</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.2.4</product> <product>xen:4.2.5</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.5.5</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.6.4</product> <product>xen:4.7.0</product> <product>xen:4.7.1</product> </cve> <cve id="CVE-2016-9383" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen</product> </cve> <cve id="CVE-2016-9380" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen</product> </cve> <cve id="CVE-2016-9381" level="MEDIUM"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>qemu</product> </cve> <cve id="CVE-2016-1007" level="LOW"> <product>acrobat:11.0.14</product> <product>acrobat_dc:15.006.30119</product> <product>acrobat_dc:15.010.20059</product> <product>acrobat_reader:11.0.14</product> <product>acrobat_reader_dc:15.006.30119</product> <product>acrobat_reader_dc:15.010.20059</product> </cve> <cve id="CVE-2016-1558" level="LOW"> <product>dap-2230_firmware:1.02</product> <product>dap-2310_firmware:2.06</product> <product>dap-2330_firmware:1.06</product> <product>dap-2360_firmware:2.06</product> <product>dap-2553_firmware:3.05</product> <product>dap-2660_firmware:1.11</product> <product>dap-2690_firmware:3.15</product> <product>dap-2695_firmware:1.16</product> <product>dap-3320_firmware:1.00</product> <product>dap-3662_firmware:1.01</product> </cve> <cve id="CVE-2016-1009" level="LOW"> <product>acrobat:11.0.14</product> <product>acrobat_dc:15.006.30119</product> <product>acrobat_dc:15.010.20059</product> <product>acrobat_reader:11.0.14</product> <product>acrobat_reader_dc:15.006.30119</product> <product>acrobat_reader_dc:15.010.20059</product> </cve> <cve id="CVE-2016-1008" level="LOW"> <product>acrobat:11.0.14</product> <product>acrobat_dc:15.006.30119</product> <product>acrobat_dc:15.010.20059</product> <product>acrobat_reader:11.0.14</product> <product>acrobat_reader_dc:15.006.30119</product> <product>acrobat_reader_dc:15.010.20059</product> </cve> <cve id="CVE-2016-1555" level="LOW"> <product>wn604_firmware:3.3.2</product> <product>wn802tv2_firmware:3.0.5.0</product> <product>wnap320_firmware:3.0.5.0</product> <product>wndap210v2_firmware:3.0.5.0</product> <product>wndap350_firmware:3.0.5.0</product> <product>wndap360_firmware:3.0.5.0</product> <product>wndap660_firmware:3.0.5.0</product> </cve> <cve id="CVE-2016-4074" level="LOW"> <product>jq:1.5</product> </cve> <cve id="CVE-2016-1277" level="MEDIUM"> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> <product>junos:15.1x49</product> </cve> <cve id="CVE-2016-8385" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-8384" level="MEDIUM"> <product>marklogic:8.0-5.5</product> </cve> <cve id="CVE-2016-8387" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-8386" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-8380" level="LOW"> <product>ilc_plcs_firmware:-</product> </cve> <cve id="CVE-2016-8383" level="MEDIUM"> <product>marklogic:8.0-5.5</product> </cve> <cve id="CVE-2016-8382" level="MEDIUM"> <product>marklogic:8.0-5.5</product> </cve> <cve id="CVE-2016-8389" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-8388" level="MEDIUM"> <product>argus:6.6.04</product> </cve> <cve id="CVE-2016-2923" level="LOW"> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-9035" level="MEDIUM"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-9036" level="LOW"> <product>msgpuck:1.0.3</product> </cve> <cve id="CVE-2016-9037" level="LOW"> <product>tarantool:1.7.2</product> </cve> <cve id="CVE-2016-2927" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2926" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-2925" level="MEDIUM"> <product>websphere_portal:6.1.0.0</product> <product>websphere_portal:6.1.0.1</product> <product>websphere_portal:6.1.0.2</product> <product>websphere_portal:6.1.0.3</product> <product>websphere_portal:6.1.0.4</product> <product>websphere_portal:6.1.0.5</product> <product>websphere_portal:6.1.0.6</product> <product>websphere_portal:6.1.5.0</product> <product>websphere_portal:6.1.5.1</product> <product>websphere_portal:6.1.5.2</product> <product>websphere_portal:6.1.5.3</product> <product>websphere_portal:7.0.0.0</product> <product>websphere_portal:7.0.0.1</product> <product>websphere_portal:7.0.0.2</product> <product>websphere_portal:8.0.0.0</product> <product>websphere_portal:8.0.0.1</product> <product>websphere_portal:8.5.0.0</product> </cve> <cve id="CVE-2016-2924" level="MEDIUM"> <product>biginsights:4.2</product> </cve> <cve id="CVE-2016-2929" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2928" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-9038" level="MEDIUM"> <product>invincea-x:6.1.3-24058</product> </cve> <cve id="CVE-2016-9039" level="LOW"> <product>smartos:20161110t013148z</product> </cve> <cve id="CVE-2016-0674" level="LOW"> <product>siebel_core-common_components:8.1.1</product> <product>siebel_core-common_components:8.2.2</product> </cve> <cve id="CVE-2016-0677" level="LOW"> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-4358" level="LOW"> <product>matrix_operating_environment:7.5</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-4359" level="LOW"> <product>loadrunner:11.52</product> <product>loadrunner:12.00</product> <product>loadrunner:12.01</product> <product>loadrunner:12.02</product> <product>loadrunner:12.50</product> <product>performance_center:11.52</product> <product>performance_center:12.00</product> <product>performance_center:12.01</product> <product>performance_center:12.20</product> <product>performance_center:12.50</product> </cve> <cve id="CVE-2016-6915" level="LOW"> <product>video_driver:-</product> <product>shield_tablet_firmware:4.3.0</product> <product>shield_tablet_tk1_firmware:1.4.0</product> <product>shield_tv_firmware:3.2</product> </cve> <cve id="CVE-2016-5654" level="MEDIUM"> <product>fusioncapital_opics_plus:-</product> </cve> <cve id="CVE-2016-5655" level="MEDIUM"> <product>fusioncapital_opics_plus:-</product> </cve> <cve id="CVE-2016-5650" level="LOW"> <product>zp-ibh-13w:-</product> <product>zp-ne-14-s:-</product> </cve> <cve id="CVE-2016-5652" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-5653" level="LOW"> <product>fusioncapital_opics_plus:-</product> </cve> <cve id="CVE-2016-3193" level="MEDIUM"> <product>fortianalyzer_firmware:5.0.0</product> <product>fortianalyzer_firmware:5.0.2</product> <product>fortianalyzer_firmware:5.0.3</product> <product>fortianalyzer_firmware:5.0.4</product> <product>fortianalyzer_firmware:5.0.5</product> <product>fortianalyzer_firmware:5.0.6</product> <product>fortianalyzer_firmware:5.0.7</product> <product>fortianalyzer_firmware:5.0.8</product> <product>fortianalyzer_firmware:5.0.9</product> <product>fortianalyzer_firmware:5.0.10</product> <product>fortianalyzer_firmware:5.0.11</product> <product>fortianalyzer_firmware:5.0.12</product> <product>fortianalyzer_firmware:5.2.0</product> <product>fortianalyzer_firmware:5.2.1</product> <product>fortianalyzer_firmware:5.2.2</product> <product>fortianalyzer_firmware:5.2.3</product> <product>fortianalyzer_firmware:5.2.4</product> <product>fortianalyzer_firmware:5.2.5</product> <product>fortianalyzer_firmware:5.4.0</product> <product>fortimanager_firmware:5.0.0</product> <product>fortimanager_firmware:5.0.1</product> <product>fortimanager_firmware:5.0.2</product> <product>fortimanager_firmware:5.0.3</product> <product>fortimanager_firmware:5.0.4</product> <product>fortimanager_firmware:5.0.5</product> <product>fortimanager_firmware:5.0.6</product> <product>fortimanager_firmware:5.0.7</product> <product>fortimanager_firmware:5.0.8</product> <product>fortimanager_firmware:5.0.9</product> <product>fortimanager_firmware:5.0.10</product> <product>fortimanager_firmware:5.0.11</product> <product>fortimanager_firmware:5.2.0</product> <product>fortimanager_firmware:5.2.1</product> <product>fortimanager_firmware:5.2.2</product> <product>fortimanager_firmware:5.2.3</product> <product>fortimanager_firmware:5.2.4</product> <product>fortimanager_firmware:5.2.5</product> <product>fortimanager_firmware:5.4.0</product> </cve> <cve id="CVE-2016-6967" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6966" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6964" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3449" level="HIGH"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-3448" level="MEDIUM"> <product>application_express:5.0.3</product> </cve> <cve id="CVE-2016-6350" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6356" level="LOW"> <product>email_security_appliance:3.3.1-09</product> <product>email_security_appliance:7.1.0</product> <product>email_security_appliance:7.1.1</product> <product>email_security_appliance:7.1.2</product> <product>email_security_appliance:7.1.3</product> <product>email_security_appliance:7.1.4</product> <product>email_security_appliance:7.1.5</product> <product>email_security_appliance:7.3.0</product> <product>email_security_appliance:7.3.1</product> <product>email_security_appliance:7.3.2</product> <product>email_security_appliance:7.5.0</product> <product>email_security_appliance:7.5.1</product> <product>email_security_appliance:7.5.2</product> <product>email_security_appliance:7.5.2-201</product> <product>email_security_appliance:7.6.0</product> <product>email_security_appliance:7.6.1-000</product> <product>email_security_appliance:7.6.1-gpl-022</product> <product>email_security_appliance:7.6.2</product> <product>email_security_appliance:7.6.3-000</product> <product>email_security_appliance:7.6.3-025</product> <product>email_security_appliance:7.7.0-000</product> <product>email_security_appliance:7.7.1-000</product> <product>email_security_appliance:7.8.0</product> <product>email_security_appliance:7.8.0-311</product> <product>email_security_appliance:8.0.1-023</product> <product>email_security_appliance:8.0_base</product> <product>email_security_appliance:8.5.0-000</product> <product>email_security_appliance:8.5.0-er1-198</product> <product>email_security_appliance:8.5.6-052</product> <product>email_security_appliance:8.5.6-073</product> <product>email_security_appliance:8.5.6-074</product> <product>email_security_appliance:8.5.6-106</product> <product>email_security_appliance:8.5.6-113</product> <product>email_security_appliance:8.5.7-042</product> <product>email_security_appliance:8.6.0</product> <product>email_security_appliance:8.6.0-011</product> <product>email_security_appliance:8.9.0</product> <product>email_security_appliance:8.9.1-000</product> <product>email_security_appliance:8.9.2-032</product> <product>email_security_appliance:9.0.0</product> <product>email_security_appliance:9.0.0-212</product> <product>email_security_appliance:9.0.0-461</product> <product>email_security_appliance:9.0.5-000</product> <product>email_security_appliance:9.1.0</product> <product>email_security_appliance:9.1.0-011</product> <product>email_security_appliance:9.1.0-032</product> <product>email_security_appliance:9.1.0-101</product> <product>email_security_appliance:9.4.0</product> <product>email_security_appliance:9.4.4-000</product> <product>email_security_appliance:9.5.0-000</product> <product>email_security_appliance:9.5.0-201</product> <product>email_security_appliance:9.6.0-000</product> <product>email_security_appliance:9.6.0-042</product> <product>email_security_appliance:9.6.0-051</product> <product>email_security_appliance:9.7.0-125</product> <product>email_security_appliance:9.7.1-066</product> </cve> <cve id="CVE-2016-6357" level="LOW"> <product>email_security_appliance:9.7.1-066</product> <product>email_security_appliance:9.9.6-026</product> </cve> <cve id="CVE-2016-6358" level="LOW"> <product>email_security_appliance:9.7.1-066</product> <product>email_security_appliance:9.7.2-046</product> <product>email_security_appliance:9.7.2-047</product> <product>email_security_appliance:9.7.2-054</product> <product>email_security_appliance:9.9.6-026</product> <product>email_security_appliance:9.9_base</product> </cve> <cve id="CVE-2016-6359" level="MEDIUM"> <product>transport_gateway_installation_software:4.1%284.0%29</product> </cve> <cve id="CVE-2016-5958" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-3047" level="MEDIUM"> <product>filenet_workplace:4.0.2</product> </cve> <cve id="CVE-2016-8819" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8818" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-3046" level="LOW"> <product>security_access_manager_for_mobile</product> <product>security_access_manager_9.0_firmware</product> <product>security_access_manager_for_web_8.0_firmware</product> </cve> <cve id="CVE-2016-8815" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8814" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8817" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8816" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8811" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8810" level="LOW"> <product>gpu_driver:341.98</product> <product>gpu_driver:373.06</product> </cve> <cve id="CVE-2016-8813" level="LOW"> <product>gpu_driver:-</product> </cve> <cve id="CVE-2016-8812" level="LOW"> <product>geforce_experience:-</product> </cve> <cve id="CVE-2016-5953" level="MEDIUM"> <product>sterling_selling_and_fulfillment_foundation:9.1.0</product> <product>sterling_selling_and_fulfillment_foundation:9.2.0</product> <product>sterling_selling_and_fulfillment_foundation:9.2.1</product> <product>sterling_selling_and_fulfillment_foundation:9.3</product> <product>sterling_selling_and_fulfillment_foundation:9.4</product> <product>sterling_selling_and_fulfillment_foundation:9.5</product> </cve> <cve id="CVE-2016-3044" level="LOW"> <product>powerkvm:2.1</product> <product>powerkvm:2.1.0.2</product> <product>powerkvm:2.1.1.0</product> <product>powerkvm:2.1.1.2</product> <product>powerkvm:2.1.1.3</product> <product>powerkvm:3.1</product> <product>powerkvm:3.1.0.1</product> </cve> <cve id="CVE-2016-5952" level="LOW"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> </cve> <cve id="CVE-2016-3043" level="MEDIUM"> <product>security_access_manager_for_mobile</product> <product>security_access_manager_9.0_firmware</product> <product>security_access_manager_for_web_7.0_firmware</product> <product>security_access_manager_for_web_8.0_firmware</product> </cve> <cve id="CVE-2016-5951" level="MEDIUM"> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-3042" level="MEDIUM"> <product>websphere_application_server:</product> </cve> <cve id="CVE-2016-5950" level="LOW"> <product>kenexa_lcms_premier:9.0</product> <product>kenexa_lcms_premier:9.1</product> <product>kenexa_lcms_premier:9.2</product> <product>kenexa_lcms_premier:9.2.1</product> <product>kenexa_lcms_premier:9.3</product> <product>kenexa_lcms_premier:9.4</product> <product>kenexa_lcms_premier:9.5</product> <product>kenexa_lcms_premier:10.0</product> <product>kenexa_lcms_premier:10.1</product> <product>kenexa_lcms_premier:10.2</product> </cve> <cve id="CVE-2016-5957" level="LOW"> <product>security_privileged_identity_manager_virtual_appliance:2.0.2</product> </cve> <cve id="CVE-2016-3040" level="MEDIUM"> <product>security_privileged_identity_manager_virtual_appliance:2.0</product> </cve> <cve id="CVE-2016-3094" level="MEDIUM"> <product>qpid_java:6.0.2</product> </cve> <cve id="CVE-2016-3095" level="LOW"> <product>pulp:2.8.1</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3096" level="LOW"> <product>ansible:1.9.6</product> <product>ansible:2.0</product> <product>ansible:2.0.1</product> <product>fedora:22</product> <product>fedora:23</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3097" level="MEDIUM"> <product>network_satellite:5.7</product> </cve> <cve id="CVE-2016-3090" level="LOW"> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.7</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.3</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.5</product> <product>struts:2.3.6</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.9</product> <product>struts:2.3.10</product> <product>struts:2.3.11</product> <product>struts:2.3.12</product> <product>struts:2.3.13</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.17</product> <product>struts:2.3.19</product> </cve> <cve id="CVE-2016-3091" level="LOW"> <product>diego:0.1468.0</product> <product>diego:0.1469.0</product> <product>diego:0.1470.0</product> </cve> <cve id="CVE-2016-3720" level="LOW"> <product>jackson:2.7.3</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3093" level="LOW"> <product>struts:2.0.0</product> <product>struts:2.0.1</product> <product>struts:2.0.2</product> <product>struts:2.0.3</product> <product>struts:2.0.4</product> <product>struts:2.0.5</product> <product>struts:2.0.6</product> <product>struts:2.0.7</product> <product>struts:2.0.8</product> <product>struts:2.0.9</product> <product>struts:2.0.10</product> <product>struts:2.0.11</product> <product>struts:2.0.11.1</product> <product>struts:2.0.11.2</product> <product>struts:2.0.12</product> <product>struts:2.0.13</product> <product>struts:2.0.14</product> <product>struts:2.1.0</product> <product>struts:2.1.1</product> <product>struts:2.1.2</product> <product>struts:2.1.3</product> <product>struts:2.1.4</product> <product>struts:2.1.5</product> <product>struts:2.1.6</product> <product>struts:2.1.8</product> <product>struts:2.1.8.1</product> <product>struts:2.2.1</product> <product>struts:2.2.1.1</product> <product>struts:2.2.3</product> <product>struts:2.2.3.1</product> <product>struts:2.3.1</product> <product>struts:2.3.1.1</product> <product>struts:2.3.1.2</product> <product>struts:2.3.4</product> <product>struts:2.3.4.1</product> <product>struts:2.3.7</product> <product>struts:2.3.8</product> <product>struts:2.3.12</product> <product>struts:2.3.14</product> <product>struts:2.3.14.1</product> <product>struts:2.3.14.2</product> <product>struts:2.3.14.3</product> <product>struts:2.3.15</product> <product>struts:2.3.15.1</product> <product>struts:2.3.15.2</product> <product>struts:2.3.15.3</product> <product>struts:2.3.16</product> <product>struts:2.3.16.1</product> <product>struts:2.3.16.2</product> <product>struts:2.3.16.3</product> <product>struts:2.3.20</product> <product>struts:2.3.20.1</product> <product>struts:2.3.20.3</product> <product>struts:2.3.24</product> <product>struts:2.3.24.1</product> <product>ognl:3.0.11</product> </cve> <cve id="CVE-2016-8311" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-3728" level="MEDIUM"> <product>foreman:1.10.3</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.0</product> <product>foreman:1.11.1</product> </cve> <cve id="CVE-2016-3729" level="LOW"> <product>moodle:2.7</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.0</product> <product>moodle:2.7.1</product> <product>moodle:2.7.2</product> <product>moodle:2.7.3</product> <product>moodle:2.7.4</product> <product>moodle:2.7.5</product> <product>moodle:2.7.6</product> <product>moodle:2.7.7</product> <product>moodle:2.7.8</product> <product>moodle:2.7.9</product> <product>moodle:2.7.10</product> <product>moodle:2.7.11</product> <product>moodle:2.7.12</product> <product>moodle:2.7.13</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:3.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> </cve> <cve id="CVE-2016-8600" level="LOW"> <product>dotcms:3.2.1</product> </cve> <cve id="CVE-2016-8977" level="LOW"> <product>bigfix_inventory:9.2</product> <product>license_metric_tool:9.2.0</product> </cve> <cve id="CVE-2016-8974" level="LOW"> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> </cve> <cve id="CVE-2016-8975" level="MEDIUM"> <product>rhapsody_design_manager:5.0</product> <product>rhapsody_design_manager:5.0.1</product> <product>rhapsody_design_manager:5.0.2</product> <product>rhapsody_design_manager:6.0</product> <product>rhapsody_design_manager:6.0.1</product> <product>rhapsody_design_manager:6.0.2</product> <product>rhapsody_design_manager:6.0.3</product> </cve> <cve id="CVE-2016-8972" level="LOW"> <product>aix:6.1</product> <product>aix:7.1</product> <product>aix:7.2</product> <product>vios:2.2.0.0</product> <product>vios:2.2.0.10</product> <product>vios:2.2.0.11</product> <product>vios:2.2.0.12</product> <product>vios:2.2.0.13</product> <product>vios:2.2.1.0</product> <product>vios:2.2.1.1</product> <product>vios:2.2.1.3</product> <product>vios:2.2.1.4</product> <product>vios:2.2.1.5</product> <product>vios:2.2.1.6</product> <product>vios:2.2.1.7</product> <product>vios:2.2.1.8</product> <product>vios:2.2.2.0</product> <product>vios:2.2.2.1</product> <product>vios:2.2.2.2</product> <product>vios:2.2.2.3</product> <product>vios:2.2.2.4</product> <product>vios:2.2.2.6</product> <product>vios:2.2.2.70</product> <product>vios:2.2.3.0</product> <product>vios:2.2.3.1</product> <product>vios:2.2.3.2</product> <product>vios:2.2.3.3</product> <product>vios:2.2.3.4</product> <product>vios:2.2.3.50</product> <product>vios:2.2.3.51</product> <product>vios:2.2.3.52</product> <product>vios:2.2.3.60</product> <product>vios:2.2.3.70</product> <product>vios:2.2.3.80</product> <product>vios:2.2.4.0</product> <product>vios:2.2.4.10</product> <product>vios:2.2.4.21</product> <product>vios:2.2.4.22</product> <product>vios:2.2.4.23</product> <product>vios:2.2.4.30</product> <product>vios:2.2.5.0</product> <product>vios:2.2.5.10</product> </cve> <cve id="CVE-2016-8605" level="LOW"> <product>guile:2.0.12</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-8606" level="LOW"> <product>guile:2.0.12</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-8971" level="LOW"> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-4170" level="MEDIUM"> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-7402" level="LOW"> <product>adaptive_server_enterprise:16.0</product> </cve> <cve id="CVE-2016-7400" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7407" level="LOW"> <product>dropbear_ssh:2016.73</product> </cve> <cve id="CVE-2016-7406" level="LOW"> <product>dropbear_ssh:2016.73</product> </cve> <cve id="CVE-2016-7405" level="LOW"> <product>adodb:5.00</product> <product>adodb:5.01</product> <product>adodb:5.02</product> <product>adodb:5.02</product> <product>adodb:5.03</product> <product>adodb:5.04</product> <product>adodb:5.04</product> <product>adodb:5.05</product> <product>adodb:5.06</product> <product>adodb:5.06</product> <product>adodb:5.07</product> <product>adodb:5.08</product> <product>adodb:5.08</product> <product>adodb:5.09</product> <product>adodb:5.09</product> <product>adodb:5.10</product> <product>adodb:5.11</product> <product>adodb:5.12</product> <product>adodb:5.13</product> <product>adodb:5.14</product> <product>adodb:5.15</product> <product>adodb:5.16</product> <product>adodb:5.16</product> <product>adodb:5.17</product> <product>adodb:5.18</product> <product>adodb:5.18</product> <product>adodb:5.19</product> <product>adodb:5.20.0</product> <product>adodb:5.20.1</product> <product>adodb:5.20.2</product> <product>adodb:5.20.3</product> <product>adodb:5.20.4</product> <product>adodb:5.20.5</product> <product>adodb:5.20.6</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7409" level="LOW"> <product>dropbear_ssh:2016.73</product> </cve> <cve id="CVE-2016-7408" level="LOW"> <product>dropbear_ssh:2016.73</product> </cve> <cve id="CVE-2016-0536" level="MEDIUM"> <product>universal_work_queue:11.5.10.2</product> </cve> <cve id="CVE-2016-0241" level="LOW"> <product>security_guardium_database_activity_monitor:8.2</product> <product>security_guardium_database_activity_monitor:9.0</product> <product>security_guardium_database_activity_monitor:9.1</product> <product>security_guardium_database_activity_monitor:9.5</product> <product>security_guardium_database_activity_monitor:10.0</product> <product>security_guardium_database_activity_monitor:10.1</product> </cve> <cve id="CVE-2016-0242" level="LOW"> <product>security_guardium:10.0</product> <product>security_guardium:10.01</product> </cve> <cve id="CVE-2016-3542" level="LOW"> <product>knowledge_management:12.1.1</product> <product>knowledge_management:12.1.2</product> <product>knowledge_management:12.1.3</product> <product>knowledge_management:12.2.3</product> <product>knowledge_management:12.2.4</product> <product>knowledge_management:12.2.5</product> </cve> <cve id="CVE-2016-3543" level="LOW"> <product>common_applications_calendar:12.1.1</product> <product>common_applications_calendar:12.1.2</product> <product>common_applications_calendar:12.1.3</product> <product>common_applications_calendar:12.2.3</product> <product>common_applications_calendar:12.2.4</product> <product>common_applications_calendar:12.2.5</product> </cve> <cve id="CVE-2016-3540" level="MEDIUM"> <product>enterprise_manager_base_platform:12.1.0.5</product> <product>enterprise_manager_base_platform:13.1.0.0</product> </cve> <cve id="CVE-2016-3541" level="LOW"> <product>common_applications_calendar:12.1.1</product> <product>common_applications_calendar:12.1.2</product> <product>common_applications_calendar:12.1.3</product> <product>common_applications_calendar:12.2.3</product> <product>common_applications_calendar:12.2.4</product> <product>common_applications_calendar:12.2.5</product> </cve> <cve id="CVE-2016-3546" level="LOW"> <product>advanced_collections:12.1.1</product> <product>advanced_collections:12.1.2</product> <product>advanced_collections:12.1.3</product> </cve> <cve id="CVE-2016-3547" level="LOW"> <product>one-to-one_fulfillment:12.1.1</product> <product>one-to-one_fulfillment:12.1.2</product> <product>one-to-one_fulfillment:12.1.3</product> <product>one-to-one_fulfillment:12.2.3</product> <product>one-to-one_fulfillment:12.2.4</product> <product>one-to-one_fulfillment:12.2.5</product> </cve> <cve id="CVE-2016-3544" level="MEDIUM"> <product>business_intelligence:11.1.1.7.0</product> <product>business_intelligence:11.1.1.9.0</product> <product>business_intelligence:11.2.1.0.0</product> </cve> <cve id="CVE-2016-3545" level="LOW"> <product>application_object_library:12.1.3</product> <product>application_object_library:12.2.3</product> <product>application_object_library:12.2.4</product> <product>application_object_library:12.2.5</product> </cve> <cve id="CVE-2016-0532" level="LOW"> <product>crm_technical_foundation:11.5.10.2</product> <product>crm_technical_foundation:12.1.3</product> <product>crm_technical_foundation:12.2.3</product> <product>crm_technical_foundation:12.2.4</product> <product>crm_technical_foundation:12.2.5</product> </cve> <cve id="CVE-2016-3548" level="LOW"> <product>marketing:12.1.1</product> <product>marketing:12.1.2</product> <product>marketing:12.1.3</product> <product>marketing:12.2.3</product> <product>marketing:12.2.4</product> <product>marketing:12.2.5</product> </cve> <cve id="CVE-2016-3549" level="LOW"> <product>e-business_suite_secure_enterprise_search:12.1.3</product> <product>e-business_suite_secure_enterprise_search:12.2.3</product> <product>e-business_suite_secure_enterprise_search:12.2.4</product> <product>e-business_suite_secure_enterprise_search:12.2.5</product> </cve> <cve id="CVE-2016-0533" level="MEDIUM"> <product>crm_technical_foundation:11.5.10.2</product> <product>crm_technical_foundation:12.1.3</product> </cve> <cve id="CVE-2016-0530" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> <product>customer_interaction_history:12.2.5</product> </cve> <cve id="CVE-2016-0531" level="LOW"> <product>applications_manager:12.1.3</product> </cve> <cve id="CVE-2016-6615" level="MEDIUM"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6614" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-3995" level="LOW"> <product>crypto%2b%2b:5.6.3</product> </cve> <cve id="CVE-2016-3222" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-6613" level="HIGH"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6612" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-9553" level="LOW"> <product>web_appliance:4.2.1.3</product> </cve> <cve id="CVE-2016-9557" level="MEDIUM"> <product>jasper:1.900.24</product> </cve> <cve id="CVE-2016-9554" level="LOW"> <product>web_appliance:4.2.1.3</product> </cve> <cve id="CVE-2016-1765" level="LOW"> <product>xcode:7.2.1</product> </cve> <cve id="CVE-2016-9559" level="MEDIUM"> <product>imagemagick:7.0.3-6</product> </cve> <cve id="CVE-2016-9558" level="LOW"> <product>libdwarf:2016-10-21</product> </cve> <cve id="CVE-2016-5001" level="LOW"> <product>hadoop:2.6.3</product> <product>hadoop:2.7.0</product> <product>hadoop:2.7.1</product> </cve> <cve id="CVE-2016-5000" level="MEDIUM"> <product>poi:3.13</product> </cve> <cve id="CVE-2016-5003" level="LOW"> <product>ws-xmlrpc:3.1.3</product> </cve> <cve id="CVE-2016-5002" level="MEDIUM"> <product>xml-rpc:3.1.3</product> </cve> <cve id="CVE-2016-5005" level="MEDIUM"> <product>archiva:1.3.9</product> </cve> <cve id="CVE-2016-5004" level="MEDIUM"> <product>ws-xmlrpc:3.1.3</product> </cve> <cve id="CVE-2016-5007" level="LOW"> <product>spring_framework:3.2.0</product> <product>spring_framework:3.2.1</product> <product>spring_framework:3.2.2</product> <product>spring_framework:3.2.3</product> <product>spring_framework:3.2.4</product> <product>spring_framework:3.2.5</product> <product>spring_framework:3.2.6</product> <product>spring_framework:3.2.7</product> <product>spring_framework:3.2.8</product> <product>spring_framework:3.2.9</product> <product>spring_framework:3.2.10</product> <product>spring_framework:3.2.11</product> <product>spring_framework:3.2.12</product> <product>spring_framework:3.2.13</product> <product>spring_framework:3.2.14</product> <product>spring_framework:3.2.15</product> <product>spring_framework:3.2.16</product> <product>spring_framework:3.2.17</product> <product>spring_framework:3.2.18</product> <product>spring_framework:4.0.0</product> <product>spring_framework:4.0.1</product> <product>spring_framework:4.0.2</product> <product>spring_framework:4.0.3</product> <product>spring_framework:4.0.4</product> <product>spring_framework:4.0.5</product> <product>spring_framework:4.0.6</product> <product>spring_framework:4.0.7</product> <product>spring_framework:4.0.8</product> <product>spring_framework:4.0.9</product> <product>spring_framework:4.1.0</product> <product>spring_framework:4.1.1</product> <product>spring_framework:4.1.2</product> <product>spring_framework:4.1.3</product> <product>spring_framework:4.1.4</product> <product>spring_framework:4.1.5</product> <product>spring_framework:4.1.6</product> <product>spring_framework:4.1.7</product> <product>spring_framework:4.1.8</product> <product>spring_framework:4.1.9</product> <product>spring_framework:4.2.0</product> <product>spring_framework:4.2.1</product> <product>spring_framework:4.2.2</product> <product>spring_framework:4.2.3</product> <product>spring_framework:4.2.4</product> <product>spring_framework:4.2.5</product> <product>spring_framework:4.2.6</product> <product>spring_framework:4.2.7</product> <product>spring_framework:4.2.8</product> <product>spring_framework:4.2.9</product> <product>spring_security:3.2.0</product> <product>spring_security:3.2.1</product> <product>spring_security:3.2.2</product> <product>spring_security:3.2.3</product> <product>spring_security:3.2.4</product> <product>spring_security:3.2.5</product> <product>spring_security:3.2.6</product> <product>spring_security:3.2.7</product> <product>spring_security:3.2.8</product> <product>spring_security:3.2.9</product> <product>spring_security:3.2.10</product> <product>spring_security:4.0.0</product> <product>spring_security:4.0.1</product> <product>spring_security:4.0.2</product> <product>spring_security:4.0.3</product> <product>spring_security:4.0.4</product> <product>spring_security:4.1.0</product> </cve> <cve id="CVE-2016-5006" level="LOW"> <product>cloud_foundry:238.0</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> </cve> <cve id="CVE-2016-0011" level="MEDIUM"> <product>sharepoint_foundation:2013</product> <product>sharepoint_server:2013</product> </cve> <cve id="CVE-2016-9739" level="LOW"> <product>security_identity_manager:7.0.0.0</product> <product>security_identity_manager:7.0.0.1</product> <product>security_identity_manager:7.0.0.2</product> <product>security_identity_manager:7.0.0.3</product> <product>security_identity_manager:7.0.1.0</product> <product>security_identity_manager:7.0.1.1</product> <product>security_identity_manager:7.0.1.2</product> <product>security_identity_manager:7.0.1.3</product> <product>security_identity_manager:7.0.1.4</product> </cve> <cve id="CVE-2016-9738" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.8</product> <product>qradar_security_information_and_event_manager:7.3.0</product> <product>qradar_security_information_and_event_manager:7.3.0</product> </cve> <cve id="CVE-2016-9737" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.4.2.4</product> <product>tririga_application_platform:3.4.2.5</product> <product>tririga_application_platform:3.5.2</product> </cve> <cve id="CVE-2016-9736" level="LOW"> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.5</product> <product>websphere_application_server:9.0</product> </cve> <cve id="CVE-2016-9735" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_doors_next_generation:6.0.3</product> <product>rational_engineering_lifecycle_manager:4.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.3</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.3</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9733" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-9732" level="MEDIUM"> <product>curam_social_program_management:6.0.4.0</product> <product>curam_social_program_management:6.0.4.1</product> <product>curam_social_program_management:6.0.4.2</product> <product>curam_social_program_management:6.0.4.3</product> <product>curam_social_program_management:6.0.4.4</product> <product>curam_social_program_management:6.0.4.5</product> <product>curam_social_program_management:6.0.4.6</product> <product>curam_social_program_management:6.0.4.7</product> <product>curam_social_program_management:6.0.4.8</product> <product>curam_social_program_management:6.0.4.9</product> <product>curam_social_program_management:6.0.5</product> <product>curam_social_program_management:6.0.5.0</product> <product>curam_social_program_management:6.0.5.1</product> <product>curam_social_program_management:6.0.5.2</product> <product>curam_social_program_management:6.0.5.3</product> <product>curam_social_program_management:6.0.5.4</product> <product>curam_social_program_management:6.0.5.5</product> <product>curam_social_program_management:6.0.5.6</product> <product>curam_social_program_management:6.0.5.7</product> <product>curam_social_program_management:6.0.5.8</product> <product>curam_social_program_management:6.0.5.9</product> <product>curam_social_program_management:6.0.5.10</product> <product>curam_social_program_management:6.1.0.0</product> <product>curam_social_program_management:6.1.0.1</product> <product>curam_social_program_management:6.1.0.2</product> <product>curam_social_program_management:6.1.0.3</product> <product>curam_social_program_management:6.1.0.4</product> <product>curam_social_program_management:6.1.1.0</product> <product>curam_social_program_management:6.1.1.1</product> <product>curam_social_program_management:6.1.1.2</product> <product>curam_social_program_management:6.1.1.3</product> <product>curam_social_program_management:6.1.1.4</product> <product>curam_social_program_management:6.2.0.0</product> <product>curam_social_program_management:6.2.0.1</product> <product>curam_social_program_management:6.2.0.2</product> <product>curam_social_program_management:6.2.0.3</product> <product>curam_social_program_management:6.2.0.4</product> <product>curam_social_program_management:7.0.0.0</product> <product>curam_social_program_management:7.0.0.1</product> </cve> <cve id="CVE-2016-9731" level="MEDIUM"> <product>business_process_manager:8.5.7.0</product> </cve> <cve id="CVE-2016-9730" level="MEDIUM"> <product>qradar_incident_forensics:7.2.0</product> <product>qradar_incident_forensics:7.2.1</product> <product>qradar_incident_forensics:7.2.2</product> <product>qradar_incident_forensics:7.2.3</product> <product>qradar_incident_forensics:7.2.4</product> <product>qradar_incident_forensics:7.2.5</product> <product>qradar_incident_forensics:7.2.6</product> <product>qradar_incident_forensics:7.2.7</product> <product>qradar_incident_forensics:7.2.8</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-1498" level="MEDIUM"> <product>owncloud:7.0.11</product> <product>owncloud:8.0.0</product> <product>owncloud:8.0.2</product> <product>owncloud:8.0.3</product> <product>owncloud:8.0.4</product> <product>owncloud:8.0.5</product> <product>owncloud:8.0.6</product> <product>owncloud:8.0.8</product> <product>owncloud:8.0.9</product> <product>owncloud:8.1.0</product> <product>owncloud:8.1.1</product> <product>owncloud:8.1.3</product> <product>owncloud:8.1.4</product> <product>owncloud:8.2.0</product> <product>owncloud:8.2.1</product> </cve> <cve id="CVE-2016-1499" level="LOW"> <product>owncloud:8.0.9</product> <product>owncloud:8.1.0</product> <product>owncloud:8.1.1</product> <product>owncloud:8.1.3</product> <product>owncloud:8.1.4</product> <product>owncloud:8.2.0</product> <product>owncloud:8.2.1</product> </cve> <cve id="CVE-2016-1492" level="MEDIUM"> <product>shareit:3.0.18_ww</product> </cve> <cve id="CVE-2016-1493" level="HIGH"> <product>driver_update_utility:2.0</product> <product>driver_update_utility:2.1</product> <product>driver_update_utility:2.2</product> <product>driver_update_utility:2.3</product> </cve> <cve id="CVE-2016-1490" level="LOW"> <product>shareit:2.5.1.1</product> </cve> <cve id="CVE-2016-1491" level="MEDIUM"> <product>shareit:2.5.1.1</product> </cve> <cve id="CVE-2016-1496" level="MEDIUM"> <product>p8_firmware:gra-cl00c92b220</product> <product>p8_firmware:gra-cl10c92b220</product> <product>p8_firmware:gra-tl00c01b220</product> <product>p8_firmware:gra-ul00c00b220</product> <product>p8_firmware:gra-ul10c00b220</product> </cve> <cve id="CVE-2016-1497" level="LOW"> <product>big-ip_access_policy_manager:11.0.0</product> <product>big-ip_access_policy_manager:11.1.0</product> <product>big-ip_access_policy_manager:11.2.0</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.3.0</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.2.1</product> <product>big-ip_advanced_firewall_manager:11.3.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.0.0</product> <product>big-ip_analytics:11.1.0</product> <product>big-ip_analytics:11.2.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.3.0</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.0.0</product> <product>big-ip_application_security_manager:11.1.0</product> <product>big-ip_application_security_manager:11.2.0</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.3.0</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:11.0.0</product> <product>big-ip_edge_gateway:11.1.0</product> <product>big-ip_edge_gateway:11.2.0</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_edge_gateway:11.3.0</product> <product>big-ip_global_traffic_manager:11.0.0</product> <product>big-ip_global_traffic_manager:11.1.0</product> <product>big-ip_global_traffic_manager:11.2.0</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.3.0</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.0.0</product> <product>big-ip_link_controller:11.1.0</product> <product>big-ip_link_controller:11.2.0</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.3.0</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.0.0</product> <product>big-ip_local_traffic_manager:11.1.0</product> <product>big-ip_local_traffic_manager:11.2.0</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.3.0</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.3.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:11.0.0</product> <product>big-ip_wan_optimization_manager:11.1.0</product> <product>big-ip_wan_optimization_manager:11.2.0</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_wan_optimization_manager:11.3.0</product> <product>big-ip_webaccelerator:11.0.0</product> <product>big-ip_webaccelerator:11.1.0</product> <product>big-ip_webaccelerator:11.2.0</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_webaccelerator:11.3.0</product> <product>big-ip_protocol_security_manager:11.0.0</product> <product>big-ip_protocol_security_manager:11.1.0</product> <product>big-ip_protocol_security_manager:11.2.0</product> <product>big-ip_protocol_security_manager:11.2.1</product> <product>big-ip_protocol_security_manager:11.3.0</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-1494" level="LOW"> <product>python:3.2.6</product> </cve> <cve id="CVE-2016-1495" level="MEDIUM"> <product>mate_s_firmware:crr-cl00c92b153</product> <product>mate_s_firmware:crr-tl00c01b153sp01</product> <product>mate_s_firmware:crr-ul00c00b153</product> </cve> <cve id="CVE-2016-7098" level="MEDIUM"> <product>wget:1.17</product> </cve> <cve id="CVE-2016-1095" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-7090" level="MEDIUM"> <product>scalance_m-800_firmware:4.01</product> <product>scalance_s615_firmware:4.01</product> </cve> <cve id="CVE-2016-7092" level="LOW"> <product>xen:-</product> </cve> <cve id="CVE-2016-7093" level="LOW"> <product>xen:4.5.3</product> <product>xen:4.6.3</product> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-7094" level="MEDIUM"> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-7095" level="LOW"> <product>exponent_cms:2.3.8</product> </cve> <cve id="CVE-2016-1093" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1090" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1091" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3392" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-3391" level="HIGH"> <product>edge:-</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3390" level="HIGH"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0370" level="MEDIUM"> <product>forms_experience_builder:8.5.0.0</product> <product>forms_experience_builder:8.5.1.0</product> <product>forms_experience_builder:8.5.1.1</product> <product>forms_experience_builder:8.6.0.0</product> <product>forms_experience_builder:8.6.1</product> <product>forms_experience_builder:8.6.1.1</product> <product>forms_experience_builder:8.6.2</product> <product>forms_experience_builder:8.6.2.1</product> </cve> <cve id="CVE-2016-0371" level="MEDIUM"> <product>tivoli_storage_manager:5.5</product> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.2</product> <product>tivoli_storage_manager:6.3.0.0</product> <product>tivoli_storage_manager:6.3.2.5</product> <product>tivoli_storage_manager:6.4.0.0</product> <product>tivoli_storage_manager:6.4.3.3</product> <product>tivoli_storage_manager:7.1.0.0</product> <product>tivoli_storage_manager:7.1.6.2</product> </cve> <cve id="CVE-2016-0372" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-0374" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-0375" level="LOW"> <product>messagesight:1.1.0.0</product> <product>messagesight:1.1.0.1</product> <product>messagesight:1.2</product> <product>messagesight:1.2.0.0</product> <product>messagesight:1.2.0.1</product> <product>messagesight:1.2.0.2</product> <product>messagesight:1.2.0.3</product> <product>messagesight:2.0.0.0</product> </cve> <cve id="CVE-2016-0377" level="LOW"> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.40</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:7.0.0.42</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-0378" level="MEDIUM"> <product>websphere_application_server:16.0.0.2</product> </cve> <cve id="CVE-2016-0379" level="MEDIUM"> <product>websphere_mq:7.5</product> <product>websphere_mq:7.5.0.1</product> <product>websphere_mq:7.5.0.2</product> <product>websphere_mq:7.5.0.3</product> <product>websphere_mq:7.5.0.4</product> <product>websphere_mq:7.5.0.5</product> <product>websphere_mq:7.5.0.6</product> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> </cve> <cve id="CVE-2016-9941" level="LOW"> <product>libvncserver:0.9.10</product> </cve> <cve id="CVE-2016-9942" level="LOW"> <product>libvncserver:0.9.10</product> </cve> <cve id="CVE-2016-10213" level="MEDIUM"> <product>advanced_core_operating_system:2.7.2</product> </cve> <cve id="CVE-2016-10212" level="MEDIUM"> <product>alteon:30.0.5.10</product> <product>alteon:30.2.1.1</product> </cve> <cve id="CVE-2016-10211" level="LOW"> <product>yara:3.5.0</product> </cve> <cve id="CVE-2016-10210" level="LOW"> <product>yara:3.5.0</product> </cve> <cve id="CVE-2016-10217" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-10216" level="MEDIUM"> <product>it_items_database:1.23</product> </cve> <cve id="CVE-2016-10215" level="MEDIUM"> <product>bigtree-form-builder:1.1</product> </cve> <cve id="CVE-2016-10214" level="LOW"> <product>virglrenderer:0.5.0</product> </cve> <cve id="CVE-2016-10219" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-10218" level="MEDIUM"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-4270" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-3979" level="LOW"> <product>java_as:7.4</product> </cve> <cve id="CVE-2016-3978" level="MEDIUM"> <product>fortios:5.0.0</product> <product>fortios:5.0.1</product> <product>fortios:5.0.2</product> <product>fortios:5.0.3</product> <product>fortios:5.0.4</product> <product>fortios:5.0.5</product> <product>fortios:5.0.6</product> <product>fortios:5.0.7</product> <product>fortios:5.0.8</product> <product>fortios:5.0.9</product> <product>fortios:5.0.10</product> <product>fortios:5.0.11</product> <product>fortios:5.0.12</product> <product>fortios:5.2.0</product> <product>fortios:5.2.1</product> <product>fortios:5.2.2</product> <product>fortios:5.4</product> </cve> <cve id="CVE-2016-3973" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-3972" level="LOW"> <product>dotcms:3.5</product> </cve> <cve id="CVE-2016-3971" level="MEDIUM"> <product>dotcms:3.5</product> </cve> <cve id="CVE-2016-3977" level="MEDIUM"> <product>giflib:5.1.2</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3976" level="LOW"> <product>netweaver:7.10</product> <product>netweaver:7.20</product> <product>netweaver:7.30</product> <product>netweaver:7.31</product> <product>netweaver:7.40</product> <product>netweaver:7.50</product> </cve> <cve id="CVE-2016-3975" level="MEDIUM"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-3974" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-8017" level="LOW"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8016" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8011" level="MEDIUM"> <product>endpoint_security_web_control:10.2.0.408</product> </cve> <cve id="CVE-2016-8010" level="LOW"> <product>application_control:7.0.0</product> <product>endpoint_security:10.2</product> </cve> <cve id="CVE-2016-8012" level="LOW"> <product>data_loss_prevention_endpoint:9.3.600</product> <product>data_loss_prevention_endpoint:9.4.200</product> </cve> <cve id="CVE-2016-8019" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-8018" level="MEDIUM"> <product>virusscan_enterprise:2.0.3</product> </cve> <cve id="CVE-2016-1531" level="MEDIUM"> <product>exim:4.86</product> </cve> <cve id="CVE-2016-4010" level="LOW"> <product>magento:2.0.5</product> <product>magento:2.0.5</product> </cve> <cve id="CVE-2016-4015" level="LOW"> <product>netweaver:7.1</product> <product>netweaver:7.2</product> <product>netweaver:7.3</product> <product>netweaver:7.4</product> </cve> <cve id="CVE-2016-4014" level="LOW"> <product>netweaver:7.4</product> </cve> <cve id="CVE-2016-4017" level="LOW"> <product>hana:-</product> </cve> <cve id="CVE-2016-4016" level="MEDIUM"> <product>java_as:7.4</product> </cve> <cve id="CVE-2016-4019" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-4018" level="LOW"> <product>hana:-</product> </cve> <cve id="CVE-2016-1113" level="MEDIUM"> <product>coldfusion:10.0</product> <product>coldfusion:11.0</product> <product>coldfusion:2016.00</product> </cve> <cve id="CVE-2016-5636" level="LOW"> <product>python:2.7.11</product> <product>python:3.0</product> <product>python:3.0.1</product> <product>python:3.1.0</product> <product>python:3.1.1</product> <product>python:3.1.2</product> <product>python:3.1.3</product> <product>python:3.1.4</product> <product>python:3.1.5</product> <product>python:3.2.0</product> <product>python:3.2.1</product> <product>python:3.2.2</product> <product>python:3.2.3</product> <product>python:3.2.4</product> <product>python:3.2.5</product> <product>python:3.2.6</product> <product>python:3.3.0</product> <product>python:3.3.1</product> <product>python:3.3.2</product> <product>python:3.3.3</product> <product>python:3.3.4</product> <product>python:3.3.5</product> <product>python:3.3.6</product> <product>python:3.4.0</product> <product>python:3.4.1</product> <product>python:3.4.2</product> <product>python:3.4.3</product> <product>python:3.4.4</product> <product>python:3.5.0</product> <product>python:3.5.1</product> </cve> <cve id="CVE-2016-5637" level="MEDIUM"> <product>libbpg:0.9.5</product> <product>libbpg:0.9.6</product> <product>libbpg:0.9.7</product> </cve> <cve id="CVE-2016-1112" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-5639" level="LOW"> <product>airmedia_am-100_firmware:1.4.0.12</product> </cve> <cve id="CVE-2016-1111" level="MEDIUM"> <product>acrobat:11.0.13</product> <product>acrobat_dc:15.006.30097</product> <product>acrobat_dc:15.009.20077</product> <product>acrobat_reader_dc:15.006.30097</product> <product>acrobat_reader_dc:15.009.20077</product> <product>reader:11.0.13</product> </cve> <cve id="CVE-2016-2949" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2948" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-9922" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-2941" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-2940" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2943" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2942" level="MEDIUM"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-2945" level="MEDIUM"> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> </cve> <cve id="CVE-2016-2944" level="LOW"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2947" level="LOW"> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_doors_next_generation:4.0.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.0</product> <product>rational_engineering_lifecycle_manager:4.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.2</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_software_architect_design_manager:4.0.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:6.0.2</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> </cve> <cve id="CVE-2016-2946" level="LOW"> <product>tivoli_monitoring:6.2.2</product> <product>tivoli_monitoring:6.2.2.1</product> <product>tivoli_monitoring:6.2.2.2</product> <product>tivoli_monitoring:6.2.2.3</product> <product>tivoli_monitoring:6.2.2.4</product> <product>tivoli_monitoring:6.2.2.5</product> <product>tivoli_monitoring:6.2.2.6</product> <product>tivoli_monitoring:6.2.2.7</product> <product>tivoli_monitoring:6.2.2.8</product> <product>tivoli_monitoring:6.2.2.9</product> <product>tivoli_monitoring:6.2.3</product> <product>tivoli_monitoring:6.3.0</product> </cve> <cve id="CVE-2016-1115" level="MEDIUM"> <product>coldfusion:10.0</product> <product>coldfusion:11.0</product> <product>coldfusion:2016.00</product> </cve> <cve id="CVE-2016-1114" level="LOW"> <product>coldfusion:10.0</product> <product>coldfusion:11.0</product> <product>coldfusion:2016.00</product> </cve> <cve id="CVE-2016-9923" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-1118" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-2364" level="LOW"> <product>fonality:12.6</product> <product>fonality:12.8</product> <product>fonality:14.1i</product> <product>hud_web:1.4.1</product> </cve> <cve id="CVE-2016-2363" level="LOW"> <product>fonality:12.6</product> <product>fonality:12.8</product> <product>fonality:14.1i</product> </cve> <cve id="CVE-2016-2362" level="LOW"> <product>fonality:12.6</product> <product>fonality:12.8</product> <product>fonality:14.1i</product> </cve> <cve id="CVE-2016-8561" level="MEDIUM"> <product>simatic_cp_1543-1_firmware:-</product> </cve> <cve id="CVE-2016-8563" level="LOW"> <product>automation_license_manager:5.3</product> </cve> <cve id="CVE-2016-8297" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-8564" level="LOW"> <product>automation_license_manager:5.3</product> </cve> <cve id="CVE-2016-3708" level="LOW"> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-8295" level="LOW"> <product>peoplesoft_enterprise_human_capital_management_time_and_labor:9.2</product> </cve> <cve id="CVE-2016-3704" level="LOW"> <product>pulp:2.8.4</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3706" level="LOW"> <product>glibc</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-8566" level="LOW"> <product>sicam_pas:-</product> </cve> <cve id="CVE-2016-3702" level="LOW"> <product>cloudforms_management_engine:5.0</product> </cve> <cve id="CVE-2016-3703" level="MEDIUM"> <product>openshift:3.1</product> <product>openshift:3.2</product> </cve> <cve id="CVE-2016-8954" level="LOW"> <product>dashdb_local:1.0.0</product> <product>dashdb_local:1.1.0</product> <product>dashdb_local:1.1.1</product> <product>dashdb_local:1.2.0</product> <product>dashdb_local:1.2.1</product> <product>dashdb_local:1.3.0</product> <product>dashdb_local:1.3.1</product> </cve> <cve id="CVE-2016-8950" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:9.5.0.1</product> <product>emptoris_sourcing:9.5.1.1</product> <product>emptoris_sourcing:9.5.1.2</product> <product>emptoris_sourcing:9.5.1.3</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-8951" level="LOW"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.2.16</product> <product>emptoris_strategic_supply_management:10.0.2.17</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.0.11</product> <product>emptoris_strategic_supply_management:10.1.0.12</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> </cve> <cve id="CVE-2016-8952" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.2.16</product> <product>emptoris_strategic_supply_management:10.0.2.17</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.0.11</product> <product>emptoris_strategic_supply_management:10.1.0.12</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> <product>emptoris_strategic_supply_management:10.1.1.9</product> <product>emptoris_strategic_supply_management:10.1.1.10</product> </cve> <cve id="CVE-2016-8953" level="MEDIUM"> <product>emptoris_sourcing:9.5</product> <product>emptoris_sourcing:9.5.0.1</product> <product>emptoris_sourcing:9.5.1.1</product> <product>emptoris_sourcing:9.5.1.2</product> <product>emptoris_sourcing:9.5.1.3</product> <product>emptoris_sourcing:10.0.0</product> <product>emptoris_sourcing:10.0.1</product> <product>emptoris_sourcing:10.0.2</product> <product>emptoris_sourcing:10.0.4</product> <product>emptoris_sourcing:10.1.0</product> <product>emptoris_sourcing:10.1.1</product> </cve> <cve id="CVE-2016-7469" level="MEDIUM"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_access_policy_manager:12.1.2</product> <product>big-ip_advanced_firewall_manager:11.2.1</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:12.1.2</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_analytics:12.1.2</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_acceleration_manager:12.1.2</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_application_security_manager:12.1.2</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_domain_name_system:12.1.2</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_link_controller:12.1.2</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_local_traffic_manager:12.1.2</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:12.1.2</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_websafe:11.6.0</product> <product>big-ip_websafe:11.6.1</product> <product>big-ip_websafe:12.0.0</product> <product>big-ip_websafe:12.1.0</product> <product>big-ip_websafe:12.1.1</product> <product>big-ip_websafe:12.1.2</product> <product>enterprise_manager:3.1.1</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-7468" level="MEDIUM"> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-7461" level="LOW"> <product>fusion:8.0.0</product> <product>fusion:8.0.1</product> <product>fusion:8.0.2</product> <product>fusion:8.1.0</product> <product>fusion:8.1.1</product> <product>fusion:8.5.0</product> <product>fusion:8.5.1</product> <product>fusion_pro:8.0.0</product> <product>fusion_pro:8.0.1</product> <product>fusion_pro:8.0.2</product> <product>fusion_pro:8.1.0</product> <product>fusion_pro:8.1.1</product> <product>fusion_pro:8.5.0</product> <product>fusion_pro:8.5.1</product> <product>workstation_player:12.0.0</product> <product>workstation_player:12.0.1</product> <product>workstation_player:12.1.0</product> <product>workstation_player:12.1.1</product> <product>workstation_player:12.5.0</product> <product>workstation_player:12.5.1</product> <product>workstation_pro:12.0.0</product> <product>workstation_pro:12.0.1</product> <product>workstation_pro:12.1.0</product> <product>workstation_pro:12.1.1</product> <product>workstation_pro:12.5.0</product> <product>workstation_pro:12.5.1</product> </cve> <cve id="CVE-2016-7460" level="LOW"> <product>vrealize_automation:6.0.0</product> <product>vrealize_automation:6.0.1</product> <product>vrealize_automation:6.0.1.1</product> <product>vrealize_automation:6.0.1.2</product> <product>vrealize_automation:6.1.0</product> <product>vrealize_automation:6.1.1</product> <product>vrealize_automation:6.2.0</product> <product>vrealize_automation:6.2.1</product> <product>vrealize_automation:6.2.2</product> <product>vrealize_automation:6.2.3</product> <product>vrealize_automation:6.2.4</product> </cve> <cve id="CVE-2016-7463" level="MEDIUM"> <product>esxi:5.5</product> <product>esxi:6.0</product> </cve> <cve id="CVE-2016-7462" level="LOW"> <product>vrealize_operations:6.0.0</product> <product>vrealize_operations:6.1.0</product> <product>vrealize_operations:6.2.0a</product> <product>vrealize_operations:6.2.1</product> <product>vrealize_operations:6.3.0</product> </cve> <cve id="CVE-2016-7467" level="MEDIUM"> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> </cve> <cve id="CVE-2016-7466" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-3568" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3569" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3560" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3561" level="LOW"> <product>agile_product_lifecycle_management_framework:9.3.4</product> <product>agile_product_lifecycle_management_framework:9.3.5</product> </cve> <cve id="CVE-2016-3563" level="MEDIUM"> <product>enterprise_manager_base_platform:12.1.0.5</product> </cve> <cve id="CVE-2016-3564" level="MEDIUM"> <product>toplink:12.1.3.0</product> <product>toplink:12.2.1.0</product> <product>toplink:12.2.1.1</product> </cve> <cve id="CVE-2016-3565" level="LOW"> <product>retail_order_broker_cloud_service:5.1</product> <product>retail_order_broker_cloud_service:5.2</product> </cve> <cve id="CVE-2016-3566" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-3567" level="MEDIUM"> <product>primavera_p6_enterprise_project_portfolio_management:8.3</product> <product>primavera_p6_enterprise_project_portfolio_management:8.4</product> <product>primavera_p6_enterprise_project_portfolio_management:15.1</product> <product>primavera_p6_enterprise_project_portfolio_management:15.2</product> <product>primavera_p6_enterprise_project_portfolio_management:16.1</product> </cve> <cve id="CVE-2016-1379" level="LOW"> <product>adaptive_security_appliance_software:9.0.1</product> <product>adaptive_security_appliance_software:9.0.2</product> <product>adaptive_security_appliance_software:9.0.2.10</product> <product>adaptive_security_appliance_software:9.0.3</product> <product>adaptive_security_appliance_software:9.0.3.6</product> <product>adaptive_security_appliance_software:9.0.3.8</product> <product>adaptive_security_appliance_software:9.0.4</product> <product>adaptive_security_appliance_software:9.0.4.1</product> <product>adaptive_security_appliance_software:9.0.4.5</product> <product>adaptive_security_appliance_software:9.0.4.7</product> <product>adaptive_security_appliance_software:9.0.4.17</product> <product>adaptive_security_appliance_software:9.0.4.20</product> <product>adaptive_security_appliance_software:9.0.4.24</product> <product>adaptive_security_appliance_software:9.0.4.26</product> <product>adaptive_security_appliance_software:9.0.4.29</product> <product>adaptive_security_appliance_software:9.0.4.33</product> <product>adaptive_security_appliance_software:9.0.4.35</product> <product>adaptive_security_appliance_software:9.0.4.37</product> <product>adaptive_security_appliance_software:9.1.1</product> <product>adaptive_security_appliance_software:9.1.1.4</product> <product>adaptive_security_appliance_software:9.1.2</product> <product>adaptive_security_appliance_software:9.1.2.8</product> <product>adaptive_security_appliance_software:9.1.3</product> <product>adaptive_security_appliance_software:9.1.3.2</product> <product>adaptive_security_appliance_software:9.1.4</product> <product>adaptive_security_appliance_software:9.1.4.5</product> <product>adaptive_security_appliance_software:9.1.5</product> <product>adaptive_security_appliance_software:9.1.5.10</product> <product>adaptive_security_appliance_software:9.1.5.12</product> <product>adaptive_security_appliance_software:9.1.5.15</product> <product>adaptive_security_appliance_software:9.1.5.21</product> <product>adaptive_security_appliance_software:9.1.6</product> <product>adaptive_security_appliance_software:9.1.6.1</product> <product>adaptive_security_appliance_software:9.1.6.4</product> <product>adaptive_security_appliance_software:9.1.6.6</product> <product>adaptive_security_appliance_software:9.1.6.8</product> <product>adaptive_security_appliance_software:9.2%280.0%29</product> <product>adaptive_security_appliance_software:9.2%280.104%29</product> <product>adaptive_security_appliance_software:9.2%283.1%29</product> <product>adaptive_security_appliance_software:9.2.1</product> <product>adaptive_security_appliance_software:9.2.2</product> <product>adaptive_security_appliance_software:9.2.2.4</product> <product>adaptive_security_appliance_software:9.2.2.7</product> <product>adaptive_security_appliance_software:9.2.2.8</product> <product>adaptive_security_appliance_software:9.2.3</product> <product>adaptive_security_appliance_software:9.2.3.3</product> <product>adaptive_security_appliance_software:9.2.3.4</product> <product>adaptive_security_appliance_software:9.2.4</product> <product>adaptive_security_appliance_software:9.3%281.50%29</product> <product>adaptive_security_appliance_software:9.3%281.105%29</product> <product>adaptive_security_appliance_software:9.3%282.100%29</product> <product>adaptive_security_appliance_software:9.3%282.243%29</product> <product>adaptive_security_appliance_software:9.3.1</product> <product>adaptive_security_appliance_software:9.3.1.1</product> <product>adaptive_security_appliance_software:9.3.2</product> <product>adaptive_security_appliance_software:9.3.2.2</product> <product>adaptive_security_appliance_software:9.3.3</product> <product>adaptive_security_appliance_software:9.3.3.1</product> <product>adaptive_security_appliance_software:9.3.3.2</product> <product>adaptive_security_appliance_software:9.3.3.5</product> <product>adaptive_security_appliance_software:9.3.3.6</product> <product>adaptive_security_appliance_software:9.4.0.115</product> <product>adaptive_security_appliance_software:9.4.1</product> <product>adaptive_security_appliance_software:9.4.1.1</product> <product>adaptive_security_appliance_software:9.4.1.2</product> <product>adaptive_security_appliance_software:9.4.1.3</product> <product>adaptive_security_appliance_software:9.4.1.5</product> <product>adaptive_security_appliance_software:9.5.1</product> </cve> <cve id="CVE-2016-5697" level="LOW"> <product>ruby-saml:1.2.0</product> </cve> <cve id="CVE-2016-1375" level="MEDIUM"> <product>ip_interoperability_and_collaboration_system:4.10</product> </cve> <cve id="CVE-2016-1374" level="LOW"> <product>unified_computing_system_performance_manager:1.0_base</product> <product>unified_computing_system_performance_manager:1.1.0</product> <product>unified_computing_system_performance_manager:1.1.1</product> <product>unified_computing_system_performance_manager:2.0.0</product> </cve> <cve id="CVE-2016-7289" level="MEDIUM"> <product>publisher:2010</product> </cve> <cve id="CVE-2016-7288" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-7284" level="MEDIUM"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7287" level="HIGH"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7286" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-7281" level="HIGH"> <product>edge:-</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7280" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-7283" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7282" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-9539" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9538" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9533" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9535" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9534" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9537" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-9536" level="LOW"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-4451" level="MEDIUM"> <product>foreman:1.11.2</product> <product>foreman:1.12.0</product> </cve> <cve id="CVE-2016-5027" level="MEDIUM"> <product>libdwarf:20160115</product> </cve> <cve id="CVE-2016-5026" level="LOW"> <product>onionshare:0.9.0</product> </cve> <cve id="CVE-2016-5025" level="LOW"> <product>gpu_driver:341.95</product> <product>gpu_driver:354.74</product> <product>gpu_driver:362.00</product> <product>gpu_driver:368.22</product> <product>gpu_driver:368.39</product> </cve> <cve id="CVE-2016-5024" level="MEDIUM"> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.1.0</product> <product>big-ip_access_policy_manager:12.1.1</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.1.0</product> <product>big-ip_advanced_firewall_manager:12.1.1</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.1.0</product> <product>big-ip_analytics:12.1.1</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_acceleration_manager:12.1.1</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> <product>big-ip_domain_name_system:12.1.0</product> <product>big-ip_domain_name_system:12.1.1</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.1.0</product> <product>big-ip_link_controller:12.1.1</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.1.0</product> <product>big-ip_local_traffic_manager:12.1.1</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.1.0</product> <product>big-ip_policy_enforcement_manager:12.1.1</product> </cve> <cve id="CVE-2016-5023" level="LOW"> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_protocol_security_manager:11.2.1</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-5022" level="LOW"> <product>big-ip_access_policy_manager:11.2.0</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.3.0</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.2.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.3.0</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.2.0</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.3.0</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:11.2.0</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_edge_gateway:11.3.0</product> <product>big-ip_global_traffic_manager:11.2.0</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.3.0</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:11.2.0</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.3.0</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.2.0</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.3.0</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:11.2.0</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_wan_optimization_manager:11.3.0</product> <product>big-ip_webaccelerator:11.2.0</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_webaccelerator:11.3.0</product> <product>big-iq_application_delivery_controller:4.5.0</product> <product>big-iq_centralized_management:4.6.0</product> <product>big-iq_cloud:4.0.0</product> <product>big-iq_cloud:4.1.0</product> <product>big-iq_cloud:4.2.0</product> <product>big-iq_cloud:4.3.0</product> <product>big-iq_cloud:4.4.0</product> <product>big-iq_cloud:4.5.0</product> <product>big-iq_cloud_and_orchestration:1.0.0</product> <product>big-iq_device:4.2.0</product> <product>big-iq_device:4.3.0</product> <product>big-iq_device:4.4.0</product> <product>big-iq_device:4.5.0</product> <product>big-iq_security:4.0.0</product> <product>big-iq_security:4.1.0</product> <product>big-iq_security:4.2.0</product> <product>big-iq_security:4.3.0</product> <product>big-iq_security:4.4.0</product> <product>big-iq_security:4.5.0</product> <product>enterprise_manager:3.1.1</product> <product>f5_iworkflow:2.0.0</product> <product>big-ip_protocol_security_manager:11.2.0</product> <product>big-ip_protocol_security_manager:11.2.1</product> <product>big-ip_protocol_security_manager:11.3.0</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-8228" level="LOW"> <product>lenovo_service_bridge:-</product> </cve> <cve id="CVE-2016-5020" level="LOW"> <product>big-ip_access_policy_manager:10.2.1</product> <product>big-ip_access_policy_manager:10.2.2</product> <product>big-ip_access_policy_manager:10.2.3</product> <product>big-ip_access_policy_manager:10.2.4</product> <product>big-ip_access_policy_manager:11.2.1</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:11.6.1</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:11.6.1</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.2.1</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:11.6.1</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:11.6.1</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_acceleration_manager:12.1.0</product> <product>big-ip_application_security_manager:10.2.1</product> <product>big-ip_application_security_manager:10.2.2</product> <product>big-ip_application_security_manager:10.2.3</product> <product>big-ip_application_security_manager:10.2.4</product> <product>big-ip_application_security_manager:11.2.1</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:11.6.1</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:10.2.1</product> <product>big-ip_edge_gateway:10.2.2</product> <product>big-ip_edge_gateway:10.2.3</product> <product>big-ip_edge_gateway:10.2.4</product> <product>big-ip_edge_gateway:11.2.1</product> <product>big-ip_global_traffic_manager:10.2.1</product> <product>big-ip_global_traffic_manager:10.2.2</product> <product>big-ip_global_traffic_manager:10.2.3</product> <product>big-ip_global_traffic_manager:10.2.4</product> <product>big-ip_global_traffic_manager:11.2.1</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_global_traffic_manager:11.6.1</product> <product>big-ip_link_controller:10.2.1</product> <product>big-ip_link_controller:10.2.2</product> <product>big-ip_link_controller:10.2.3</product> <product>big-ip_link_controller:10.2.4</product> <product>big-ip_link_controller:11.2.1</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:11.6.1</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:10.2.1</product> <product>big-ip_local_traffic_manager:10.2.2</product> <product>big-ip_local_traffic_manager:10.2.3</product> <product>big-ip_local_traffic_manager:10.2.4</product> <product>big-ip_local_traffic_manager:11.2.1</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:11.6.1</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:11.6.1</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_wan_optimization_manager:10.2.1</product> <product>big-ip_wan_optimization_manager:10.2.2</product> <product>big-ip_wan_optimization_manager:10.2.3</product> <product>big-ip_wan_optimization_manager:10.2.4</product> <product>big-ip_wan_optimization_manager:11.2.1</product> <product>big-ip_webaccelerator:10.2.1</product> <product>big-ip_webaccelerator:10.2.2</product> <product>big-ip_webaccelerator:10.2.3</product> <product>big-ip_webaccelerator:10.2.4</product> <product>big-ip_webaccelerator:11.2.1</product> <product>big-ip_protocol_security_manager:10.2.1</product> <product>big-ip_protocol_security_manager:10.2.2</product> <product>big-ip_protocol_security_manager:10.2.3</product> <product>big-ip_protocol_security_manager:10.2.4</product> <product>big-ip_protocol_security_manager:11.3.0</product> <product>big-ip_protocol_security_manager:11.4.0</product> <product>big-ip_protocol_security_manager:11.4.1</product> </cve> <cve id="CVE-2016-8226" level="LOW"> <product>flex_system_x240_m5_bios:-</product> <product>flex_system_x280_m6_bios:-</product> <product>flex_system_x480_x6_bios:-</product> <product>flex_system_x880_x6_bios:-</product> <product>nextscale_nx360_m5_bios:-</product> <product>system_x3250_m6_bios:-</product> <product>system_x3500_m5_bios:-</product> <product>system_x3550_m5_bios:-</product> <product>system_x3650_m5_bios:-</product> <product>system_x3850_x6_bios:-</product> <product>system_x3950_x6_bios:-</product> </cve> <cve id="CVE-2016-8227" level="LOW"> <product>transition:-</product> </cve> <cve id="CVE-2016-8224" level="LOW"> <product>bios:-</product> <product>notebook_110_14ibr_bios:-</product> <product>notebook_110_15ibr_bios:-</product> <product>notebook_b70_80_bios:-</product> <product>notebook_e31_80_bios:-</product> <product>notebook_e40_80_bios:-</product> <product>notebook_e41_80_bios:-</product> <product>notebook_e51_80_bios:-</product> <product>notebook_g40_80_bios:-</product> <product>notebook_g50_80_bios:-</product> <product>notebook_g50_80_touch_bios:-</product> <product>notebook_ideapad_300_14ibr_bios:-</product> <product>notebook_ideapad_300_14isk_bios:-</product> <product>notebook_ideapad_300_15ibr_bios:-</product> <product>notebook_ideapad_300_15isk_bios:-</product> <product>notebook_ideapad_300_17isk_bios:-</product> <product>notebook_ideapad_510s_12isk_bios:-</product> <product>notebook_k21_80_bios:-</product> <product>notebook_k41_80_bios:-</product> <product>notebook_miix_710_12ikb_bios:-</product> <product>notebook_xiaoxin_air_12_bios:-</product> <product>notebook_yoga_510_14isk_bios:-</product> <product>notebook_yoga_510_15isk_bios:-</product> <product>notebook_yoga_710_11ikb_bios:-</product> <product>notebook_yoga_710_11isk_bios:-</product> <product>notebook_yoga_900_13isk_bios:-</product> <product>notebook_yoga_900s_12isk_bios:-</product> <product>thinkserver_ts150_bios:-</product> <product>thinkserver_ts450_bios:-</product> </cve> <cve id="CVE-2016-8225" level="LOW"> <product>edge_keyboard_driver:1.20</product> <product>slim_usb_keyboard_driver:1.20</product> </cve> <cve id="CVE-2016-8222" level="MEDIUM"> <product>thinkpad_10_ella_2_bios:-</product> <product>thinkpad_11e_beema_bios:-</product> <product>thinkpad_11e_braswell_bios:-</product> <product>thinkpad_11e_broadwell_bios:-</product> <product>thinkpad_11e_skylake_bios:-</product> <product>thinkpad_13e_bios:-</product> <product>thinkpad_e450_bios:-</product> <product>thinkpad_e450c_bios:-</product> <product>thinkpad_e455_bios:-</product> <product>thinkpad_e460_bios:-</product> <product>thinkpad_e465_bios:-</product> <product>thinkpad_e550_bios:-</product> <product>thinkpad_e550c_bios:-</product> <product>thinkpad_e555_bios:-</product> <product>thinkpad_e560_bios:-</product> <product>thinkpad_e565_bios:-</product> <product>thinkpad_edge_e440_bios:-</product> <product>thinkpad_edge_e445_bios:-</product> <product>thinkpad_edge_e540_bios:-</product> <product>thinkpad_edge_e545_bios:-</product> <product>thinkpad_helix_20cg_bios:-</product> <product>thinkpad_helix_20ch_bios:-</product> <product>thinkpad_l440_bios:-</product> <product>thinkpad_l450_bios:-</product> <product>thinkpad_l460_bios:-</product> <product>thinkpad_l540_bios:-</product> <product>thinkpad_l560_bios:-</product> <product>thinkpad_p50_bios:-</product> <product>thinkpad_p50s_bios:-</product> <product>thinkpad_p70_bios:-</product> <product>thinkpad_s1_yoga_12_bios:-</product> <product>thinkpad_s1_yoga_non_vpro_bios:-</product> <product>thinkpad_s1_yoga_vpro_bios:-</product> <product>thinkpad_s3_s440_bios:-</product> <product>thinkpad_s3_yoga_14_bios:-</product> <product>thinkpad_s540_bios:-</product> <product>thinkpad_s5_e560p_bios:-</product> <product>thinkpad_s5_yoga_15_bios:-</product> <product>thinkpad_t440_bios:-</product> <product>thinkpad_t440p_bios:-</product> <product>thinkpad_t440s_bios:-</product> <product>thinkpad_t440u_bios:-</product> <product>thinkpad_t450_bios:-</product> <product>thinkpad_t450s_bios:-</product> <product>thinkpad_t460_bios:-</product> <product>thinkpad_t460p_bios:-</product> <product>thinkpad_t460s_bios:-</product> <product>thinkpad_t540_bios:-</product> <product>thinkpad_t540p_bios:-</product> <product>thinkpad_t550_bios:-</product> <product>thinkpad_t560_bios:-</product> <product>thinkpad_tablet_10_bios:-</product> <product>thinkpad_tablet_8_bios:-</product> <product>thinkpad_w540_bios:-</product> <product>thinkpad_w541_bios:-</product> <product>thinkpad_w550s_bios:-</product> <product>thinkpad_x140e_amd_bios:-</product> <product>thinkpad_x1_carbon_20ax_bios:-</product> <product>thinkpad_x1_carbon_20bx_bios:-</product> <product>thinkpad_x1_carbon_bios:-</product> <product>thinkpad_x1_tablet_bios:-</product> <product>thinkpad_x1_yoga_bios:-</product> <product>thinkpad_x240_bios:-</product> <product>thinkpad_x240s_bios:-</product> <product>thinkpad_x250_broadwell_bios:-</product> <product>thinkpad_x250_sharkbay_bios:-</product> <product>thinkpad_x260_bios:-</product> <product>thinkpad_yoga_11e_beema_bios:-</product> <product>thinkpad_yoga_11e_bios:-</product> <product>thinkpad_yoga_11e_braswell_bios:-</product> <product>thinkpad_yoga_11e_broadwell_bios:-</product> <product>thinkpad_yoga_11e_skylake_bios:-</product> <product>thinkpad_yoga_14_460_s3_bios:-</product> <product>thinkpad_yoga_260_s1_bios:-</product> </cve> <cve id="CVE-2016-8223" level="LOW"> <product>system_interface_foundation:1.0.66.0</product> </cve> <cve id="CVE-2016-5029" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-5028" level="MEDIUM"> <product>libdwarf:20160613</product> </cve> <cve id="CVE-2016-0039" level="MEDIUM"> <product>sharepoint_foundation:2013</product> </cve> <cve id="CVE-2016-0032" level="MEDIUM"> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-0031" level="MEDIUM"> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-0030" level="MEDIUM"> <product>exchange_server:2013</product> <product>exchange_server:2013</product> <product>exchange_server:2016</product> </cve> <cve id="CVE-2016-0034" level="MEDIUM"> <product>silverlight:5.0</product> </cve> <cve id="CVE-2016-9287" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9286" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9285" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9284" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9283" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9282" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9288" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-10006" level="MEDIUM"> <product>antisamy:1.5.4</product> </cve> <cve id="CVE-2016-10007" level="LOW"> <product>dotcms:1.9</product> <product>dotcms:1.9.2.1</product> <product>dotcms:1.9.5.1</product> <product>dotcms:2.0</product> <product>dotcms:2.0.1</product> <product>dotcms:2.1</product> <product>dotcms:2.1.1</product> <product>dotcms:2.2</product> <product>dotcms:2.2.1</product> <product>dotcms:2.3</product> <product>dotcms:2.3.1</product> <product>dotcms:2.3.2</product> <product>dotcms:2.5</product> <product>dotcms:2.5.1</product> <product>dotcms:2.5.2</product> <product>dotcms:2.5.3</product> <product>dotcms:2.5.4</product> <product>dotcms:3.0</product> <product>dotcms:3.0.1</product> <product>dotcms:3.1</product> <product>dotcms:3.2</product> <product>dotcms:3.2.1</product> <product>dotcms:3.2.2</product> <product>dotcms:3.2.3</product> <product>dotcms:3.2.4</product> <product>dotcms:3.3</product> <product>dotcms:3.3.1</product> <product>dotcms:3.3.2</product> <product>dotcms:3.5</product> <product>dotcms:3.5.1</product> <product>dotcms:3.6.0</product> <product>dotcms:3.6.1</product> <product>dotcms:3.6.2</product> <product>dotcms:3.7.0</product> <product>dotcms:3.7.1</product> <product>dotcms:4.0.0</product> <product>dotcms:4.0.1</product> <product>dotcms:4.1.0</product> </cve> <cve id="CVE-2016-10005" level="LOW"> <product>solution_manager:7.1</product> <product>solution_manager:7.1</product> <product>solution_manager:7.1</product> <product>solution_manager:7.1</product> <product>solution_manager:7.1</product> <product>solution_manager:7.2</product> <product>solution_manager:7.2</product> <product>solution_manager:7.2</product> <product>solution_manager:7.31</product> </cve> <cve id="CVE-2016-10003" level="LOW"> <product>squid:3.5.0.1</product> <product>squid:3.5.0.2</product> <product>squid:3.5.0.3</product> <product>squid:3.5.0.4</product> <product>squid:3.5.1</product> <product>squid:3.5.2</product> <product>squid:3.5.3</product> <product>squid:3.5.4</product> <product>squid:3.5.5</product> <product>squid:3.5.6</product> <product>squid:3.5.7</product> <product>squid:3.5.8</product> <product>squid:3.5.9</product> <product>squid:3.5.10</product> <product>squid:3.5.11</product> <product>squid:3.5.12</product> <product>squid:3.5.13</product> <product>squid:3.5.14</product> <product>squid:3.5.15</product> <product>squid:3.5.16</product> <product>squid:3.5.17</product> <product>squid:3.5.18</product> <product>squid:3.5.19</product> <product>squid:3.5.20</product> <product>squid:3.5.21</product> <product>squid:3.5.22</product> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> <product>squid:4.0.7</product> <product>squid:4.0.8</product> <product>squid:4.0.9</product> <product>squid:4.0.10</product> <product>squid:4.0.11</product> <product>squid:4.0.12</product> <product>squid:4.0.13</product> <product>squid:4.0.14</product> <product>squid:4.0.15</product> <product>squid:4.0.16</product> </cve> <cve id="CVE-2016-10550" level="LOW"> <product>sequelize:3.16.0</product> </cve> <cve id="CVE-2016-10551" level="LOW"> <product>waterline-sequel:0.5.0</product> </cve> <cve id="CVE-2016-10552" level="MEDIUM"> <product>igniteui:0.0.5</product> </cve> <cve id="CVE-2016-10553" level="LOW"> <product>sequelize:2.1.3</product> </cve> <cve id="CVE-2016-10554" level="LOW"> <product>sequelize:1.6.0</product> <product>sequelize:1.7.0</product> <product>sequelize:1.7.0</product> </cve> <cve id="CVE-2016-10555" level="LOW"> <product>jwt-simple:0.3.0</product> </cve> <cve id="CVE-2016-10556" level="LOW"> <product>sequelize:3.19.3</product> </cve> <cve id="CVE-2016-10009" level="LOW"> <product>openssh:7.3</product> </cve> <cve id="CVE-2016-4488" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4489" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4487" level="MEDIUM"> <product>libiberty</product> </cve> <cve id="CVE-2016-4484" level="LOW"> <product>cryptsetup:2.1.7.3-2</product> </cve> <cve id="CVE-2016-4480" level="LOW"> <product>vm_server:3.2</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> <product>xen:4.6.1</product> </cve> <cve id="CVE-2016-2556" level="LOW"> <product>r340:431.61</product> <product>r352:353.82</product> </cve> <cve id="CVE-2016-2557" level="LOW"> <product>r340:431.61</product> <product>r352:353.82</product> </cve> <cve id="CVE-2016-2555" level="LOW"> <product>atutor:2.2.1</product> </cve> <cve id="CVE-2016-2880" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> </cve> <cve id="CVE-2016-2881" level="LOW"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2882" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-2883" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> </cve> <cve id="CVE-2016-2888" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> </cve> <cve id="CVE-2016-2889" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-2558" level="LOW"> <product>r340:431.61</product> <product>r352:353.82</product> </cve> <cve id="CVE-2016-2559" level="MEDIUM"> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0</product> <product>phpmyadmin:4.5.0.1</product> <product>phpmyadmin:4.5.0.2</product> <product>phpmyadmin:4.5.1</product> <product>phpmyadmin:4.5.2</product> <product>phpmyadmin:4.5.3</product> <product>phpmyadmin:4.5.3.1</product> <product>phpmyadmin:4.5.4</product> <product>phpmyadmin:4.5.4.1</product> <product>phpmyadmin:4.5.5</product> </cve> <cve id="CVE-2016-1000156" level="LOW"> <product>mailcwp:1.100</product> </cve> <cve id="CVE-2016-2088" level="MEDIUM"> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> </cve> <cve id="CVE-2016-2089" level="MEDIUM"> <product>jasper:1.900.1</product> </cve> <cve id="CVE-2016-2084" level="HIGH"> <product>big-ip_access_policy_manager:11.3.0</product> <product>big-ip_access_policy_manager:11.4.0</product> <product>big-ip_access_policy_manager:11.4.1</product> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.5.4</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.3.0</product> <product>big-ip_advanced_firewall_manager:11.4.0</product> <product>big-ip_advanced_firewall_manager:11.4.1</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.5.4</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.3.0</product> <product>big-ip_analytics:11.4.0</product> <product>big-ip_analytics:11.4.1</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.5.4</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.4.1</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.5.4</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.3.0</product> <product>big-ip_application_security_manager:11.4.0</product> <product>big-ip_application_security_manager:11.4.1</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.5.4</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_edge_gateway:11.3.0</product> <product>big-ip_global_traffic_manager:11.3.0</product> <product>big-ip_global_traffic_manager:11.4.0</product> <product>big-ip_global_traffic_manager:11.4.1</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.5.4</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.3.0</product> <product>big-ip_link_controller:11.4.0</product> <product>big-ip_link_controller:11.4.1</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.5.4</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.3.0</product> <product>big-ip_local_traffic_manager:11.4.0</product> <product>big-ip_local_traffic_manager:11.4.1</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.5.4</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.3.0</product> <product>big-ip_policy_enforcement_manager:11.4.0</product> <product>big-ip_policy_enforcement_manager:11.4.1</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.5.4</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-ip_protocol_security_module:11.3.0</product> <product>big-ip_protocol_security_module:11.4.0</product> <product>big-ip_wan_optimization_manager:11.3.0</product> <product>big-ip_webaccelerator:11.3.0</product> <product>big-iq_application_delivery_controller:4.5.0</product> <product>big-iq_cloud:4.2.0</product> <product>big-iq_cloud:4.3.0</product> <product>big-iq_cloud:4.4.0</product> <product>big-iq_cloud:4.5.0</product> <product>big-iq_device:4.2.0</product> <product>big-iq_device:4.3.0</product> <product>big-iq_device:4.4.0</product> <product>big-iq_device:4.5.0</product> <product>big-iq_security:4.2.0</product> <product>big-iq_security:4.3.0</product> <product>big-iq_security:4.4.0</product> <product>big-iq_security:4.5.0</product> </cve> <cve id="CVE-2016-2086" level="LOW"> <product>node.js:0.10.0</product> <product>node.js:0.10.1</product> <product>node.js:0.10.2</product> <product>node.js:0.10.3</product> <product>node.js:0.10.4</product> <product>node.js:0.10.5</product> <product>node.js:0.10.6</product> <product>node.js:0.10.7</product> <product>node.js:0.10.8</product> <product>node.js:0.10.9</product> <product>node.js:0.10.10</product> <product>node.js:0.10.11</product> <product>node.js:0.10.12</product> <product>node.js:0.10.13</product> <product>node.js:0.10.14</product> <product>node.js:0.10.15</product> <product>node.js:0.10.16</product> <product>node.js:0.10.16-isaacs-manual</product> <product>node.js:0.10.17</product> <product>node.js:0.10.18</product> <product>node.js:0.10.19</product> <product>node.js:0.10.20</product> <product>node.js:0.10.21</product> <product>node.js:0.10.22</product> <product>node.js:0.10.23</product> <product>node.js:0.10.24</product> <product>node.js:0.10.25</product> <product>node.js:0.10.26</product> <product>node.js:0.10.27</product> <product>node.js:0.10.28</product> <product>node.js:0.10.29</product> <product>node.js:0.10.30</product> <product>node.js:0.10.31</product> <product>node.js:0.10.32</product> <product>node.js:0.10.33</product> <product>node.js:0.10.34</product> <product>node.js:0.10.35</product> <product>node.js:0.10.36</product> <product>node.js:0.10.37</product> <product>node.js:0.10.38</product> <product>node.js:0.10.39</product> <product>node.js:0.10.40</product> <product>node.js:0.10.41</product> <product>node.js:0.12.0</product> <product>node.js:0.12.1</product> <product>node.js:0.12.2</product> <product>node.js:0.12.3</product> <product>node.js:0.12.4</product> <product>node.js:0.12.5</product> <product>node.js:0.12.6</product> <product>node.js:0.12.7</product> <product>node.js:0.12.8</product> <product>node.js:0.12.9</product> <product>node.js:4.0.0</product> <product>node.js:4.1.0</product> <product>node.js:4.1.1</product> <product>node.js:4.1.2</product> <product>node.js:4.2.0</product> <product>node.js:4.2.1</product> <product>node.js:4.2.2</product> <product>node.js:4.2.3</product> <product>node.js:4.2.4</product> <product>node.js:4.2.5</product> <product>node.js:4.2.6</product> <product>node.js:5.0.0</product> <product>node.js:5.1.0</product> <product>node.js:5.1.1</product> <product>node.js:5.2.0</product> <product>node.js:5.3.0</product> <product>node.js:5.4.0</product> <product>node.js:5.4.1</product> <product>node.js:5.5.0</product> <product>fedora:22</product> <product>fedora:23</product> </cve> <cve id="CVE-2016-2087" level="MEDIUM"> <product>hexchat:2.11.0</product> </cve> <cve id="CVE-2016-2081" level="MEDIUM"> <product>vrealize_log_insight:2.0</product> <product>vrealize_log_insight:2.0.5</product> <product>vrealize_log_insight:2.5</product> <product>vrealize_log_insight:2.5.1</product> <product>vrealize_log_insight:3.0</product> <product>vrealize_log_insight:3.0.1</product> <product>vrealize_log_insight:3.3</product> <product>vrealize_log_insight:3.3.1</product> </cve> <cve id="CVE-2016-2082" level="MEDIUM"> <product>vrealize_log_insight:2.0</product> <product>vrealize_log_insight:2.0.5</product> <product>vrealize_log_insight:2.5</product> <product>vrealize_log_insight:2.5.1</product> <product>vrealize_log_insight:3.0</product> <product>vrealize_log_insight:3.0.1</product> <product>vrealize_log_insight:3.3</product> <product>vrealize_log_insight:3.3.1</product> </cve> <cve id="CVE-2016-2774" level="MEDIUM"> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1-esv</product> <product>dhcp:4.1.0</product> <product>dhcp:4.1.0</product> <product>dhcp:4.1.0</product> <product>dhcp:4.1.0</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.1</product> <product>dhcp:4.1.2</product> <product>dhcp:4.1.2</product> <product>dhcp:4.1.2</product> <product>dhcp:4.1.2</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.0</product> <product>dhcp:4.2.1</product> <product>dhcp:4.2.1</product> <product>dhcp:4.2.1</product> <product>dhcp:4.2.1</product> <product>dhcp:4.2.2</product> <product>dhcp:4.2.2</product> <product>dhcp:4.2.2</product> <product>dhcp:4.2.3</product> <product>dhcp:4.2.3</product> <product>dhcp:4.2.3</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.4</product> <product>dhcp:4.2.5</product> <product>dhcp:4.2.5</product> <product>dhcp:4.2.5</product> <product>dhcp:4.2.5</product> <product>dhcp:4.2.6</product> <product>dhcp:4.2.6</product> <product>dhcp:4.2.6</product> <product>dhcp:4.2.7</product> <product>dhcp:4.2.7</product> <product>dhcp:4.2.7</product> <product>dhcp:4.2.8</product> <product>dhcp:4.2.8</product> <product>dhcp:4.2.8</product> <product>dhcp:4.2.8</product> <product>dhcp:4.3.0</product> <product>dhcp:4.3.0</product> <product>dhcp:4.3.0</product> <product>dhcp:4.3.0</product> <product>dhcp:4.3.1</product> <product>dhcp:4.3.1</product> <product>dhcp:4.3.1</product> <product>dhcp:4.3.2</product> <product>dhcp:4.3.2</product> <product>dhcp:4.3.2</product> <product>dhcp:4.3.2</product> <product>dhcp:4.3.3</product> <product>dhcp:4.3.3</product> </cve> <cve id="CVE-2016-2775" level="MEDIUM"> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>hp-ux:b.11.31</product> </cve> <cve id="CVE-2016-2779" level="LOW"> <product>util-linux:2.24.2-1</product> </cve> <cve id="CVE-2016-6257" level="LOW"> <product>km714_firmware:012.005.00028</product> <product>firmware:-</product> <product>km632_firmware:-</product> <product>ultraslim_firmware:-</product> <product>unifying_firmware:012.005.00028</product> <product>unifying_firmware:024.003.00027</product> </cve> <cve id="CVE-2016-6256" level="MEDIUM"> <product>business_one:1.2.3</product> </cve> <cve id="CVE-2016-6253" level="LOW"> <product>netbsd:6.0</product> <product>netbsd:6.0.1</product> <product>netbsd:6.0.2</product> <product>netbsd:6.0.3</product> <product>netbsd:6.0.4</product> <product>netbsd:6.0.5</product> <product>netbsd:6.0.6</product> <product>netbsd:6.1</product> <product>netbsd:6.1.1</product> <product>netbsd:6.1.2</product> <product>netbsd:6.1.3</product> <product>netbsd:6.1.4</product> <product>netbsd:6.1.5</product> <product>netbsd:7.0</product> </cve> <cve id="CVE-2016-6252" level="LOW"> <product>shadow:4.2.1</product> </cve> <cve id="CVE-2016-6259" level="LOW"> <product>xenserver:6.0</product> <product>xenserver:6.0.2</product> <product>xenserver:6.1</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5.0</product> <product>xenserver:7.0</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-6258" level="LOW"> <product>xenserver:6.0</product> <product>xenserver:6.0.2</product> <product>xenserver:6.1</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5.0</product> <product>xenserver:7.0</product> <product>xen:3.4.0</product> <product>xen:3.4.2</product> <product>xen:3.4.3</product> <product>xen:3.4.4</product> <product>xen:4.0.0</product> <product>xen:4.0.1</product> <product>xen:4.0.3</product> <product>xen:4.0.4</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.5.0</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-7079" level="LOW"> <product>tools:9.0.0</product> <product>tools:9.0.1</product> <product>tools:9.0.5</product> <product>tools:9.0.10</product> <product>tools:9.0.11</product> <product>tools:9.0.12</product> <product>tools:9.0.13</product> <product>tools:9.0.15</product> <product>tools:9.0.16</product> <product>tools:9.0.17</product> <product>tools:9.4.0</product> <product>tools:9.4.5</product> <product>tools:9.4.10</product> <product>tools:9.4.11</product> <product>tools:9.4.12</product> <product>tools:9.4.15</product> <product>tools:9.10.0</product> <product>tools:9.10.1</product> <product>tools:9.10.5</product> <product>tools:10.0.0</product> <product>tools:10.0.5</product> <product>tools:10.0.6</product> <product>tools:10.0.8</product> </cve> <cve id="CVE-2016-7614" level="LOW"> <product>icloud:6.0.1</product> </cve> <cve id="CVE-2016-4265" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-10499" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10498" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_427_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_435_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_810_firmware:-</product> <product>sdm630_firmware:-</product> <product>sdm636_firmware:-</product> <product>sdm660_firmware:-</product> </cve> <cve id="CVE-2016-4251" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4250" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4257" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4256" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4255" level="MEDIUM"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4254" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-10491" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10490" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10493" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10492" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10495" level="LOW"> <product>mdm9635m_firmware:-</product> </cve> <cve id="CVE-2016-10494" level="LOW"> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_820a_firmware:-</product> </cve> <cve id="CVE-2016-10497" level="LOW"> <product>mdm9206_firmware:-</product> <product>mdm9607_firmware:-</product> <product>mdm9615_firmware:-</product> <product>mdm9625_firmware:-</product> <product>mdm9635m_firmware:-</product> <product>mdm9640_firmware:-</product> <product>mdm9645_firmware:-</product> <product>mdm9650_firmware:-</product> <product>mdm9655_firmware:-</product> <product>msm8909w_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_400_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_425_firmware:-</product> <product>sd_430_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_617_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_800_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> <product>sd_820_firmware:-</product> <product>sd_835_firmware:-</product> <product>sd_845_firmware:-</product> <product>sd_850_firmware:-</product> <product>sdx20_firmware:-</product> </cve> <cve id="CVE-2016-10496" level="LOW"> <product>mdm9635m_firmware:-</product> <product>sd_205_firmware:-</product> <product>sd_210_firmware:-</product> <product>sd_212_firmware:-</product> <product>sd_410_firmware:-</product> <product>sd_412_firmware:-</product> <product>sd_415_firmware:-</product> <product>sd_450_firmware:-</product> <product>sd_615_firmware:-</product> <product>sd_616_firmware:-</product> <product>sd_625_firmware:-</product> <product>sd_650_firmware:-</product> <product>sd_652_firmware:-</product> <product>sd_808_firmware:-</product> <product>sd_810_firmware:-</product> </cve> <cve id="CVE-2016-8032" level="MEDIUM"> <product>anti-malware_scan_engine:5200</product> <product>anti-malware_scan_engine:5200</product> <product>anti-malware_scan_engine:5200</product> <product>anti-malware_scan_engine:5300</product> <product>anti-malware_scan_engine:5300</product> <product>anti-malware_scan_engine:5300</product> <product>anti-malware_scan_engine:5400</product> <product>anti-malware_scan_engine:5400</product> <product>anti-malware_scan_engine:5400</product> <product>anti-malware_scan_engine:5500</product> <product>anti-malware_scan_engine:5500</product> <product>anti-malware_scan_engine:5500</product> <product>anti-malware_scan_engine:5600</product> <product>anti-malware_scan_engine:5600</product> <product>anti-malware_scan_engine:5600</product> <product>anti-malware_scan_engine:5700</product> <product>anti-malware_scan_engine:5700</product> <product>anti-malware_scan_engine:5700</product> <product>anti-malware_scan_engine:5800</product> <product>anti-malware_scan_engine:5800</product> <product>anti-malware_scan_engine:5800</product> </cve> <cve id="CVE-2016-8031" level="MEDIUM"> <product>anti-malware_scan_engine_for_aix:5200</product> <product>anti-malware_scan_engine_for_aix:5300</product> <product>anti-malware_scan_engine_for_aix:5400</product> <product>anti-malware_scan_engine_for_aix:5500</product> <product>anti-malware_scan_engine_for_aix:5600</product> <product>anti-malware_scan_engine_for_aix:5700</product> <product>anti-malware_scan_engine_for_aix:5800</product> <product>anti-malware_scan_engine_for_freebsd:5200</product> <product>anti-malware_scan_engine_for_freebsd:5300</product> <product>anti-malware_scan_engine_for_freebsd:5400</product> <product>anti-malware_scan_engine_for_freebsd:5500</product> <product>anti-malware_scan_engine_for_freebsd:5600</product> <product>anti-malware_scan_engine_for_freebsd:5700</product> <product>anti-malware_scan_engine_for_freebsd:5800</product> <product>anti-malware_scan_engine_for_hp-ux:5200</product> <product>anti-malware_scan_engine_for_hp-ux:5300</product> <product>anti-malware_scan_engine_for_hp-ux:5400</product> <product>anti-malware_scan_engine_for_hp-ux:5500</product> <product>anti-malware_scan_engine_for_hp-ux:5600</product> <product>anti-malware_scan_engine_for_hp-ux:5700</product> <product>anti-malware_scan_engine_for_hp-ux:5800</product> <product>anti-malware_scan_engine_for_linux:5200</product> <product>anti-malware_scan_engine_for_linux:5300</product> <product>anti-malware_scan_engine_for_linux:5400</product> <product>anti-malware_scan_engine_for_linux:5500</product> <product>anti-malware_scan_engine_for_linux:5600</product> <product>anti-malware_scan_engine_for_linux:5700</product> <product>anti-malware_scan_engine_for_linux:5800</product> <product>anti-malware_scan_engine_for_sun_solaris:5200</product> <product>anti-malware_scan_engine_for_sun_solaris:5300</product> <product>anti-malware_scan_engine_for_sun_solaris:5400</product> <product>anti-malware_scan_engine_for_sun_solaris:5500</product> <product>anti-malware_scan_engine_for_sun_solaris:5600</product> <product>anti-malware_scan_engine_for_sun_solaris:5700</product> <product>anti-malware_scan_engine_for_sun_solaris:5800</product> <product>anti-malware_scan_engine_for_windows:5200</product> <product>anti-malware_scan_engine_for_windows:5300</product> <product>anti-malware_scan_engine_for_windows:5400</product> <product>anti-malware_scan_engine_for_windows:5500</product> <product>anti-malware_scan_engine_for_windows:5600</product> <product>anti-malware_scan_engine_for_windows:5700</product> <product>anti-malware_scan_engine_for_windows:5800</product> </cve> <cve id="CVE-2016-8030" level="MEDIUM"> <product>virusscan_enterprise:8.8.0</product> </cve> <cve id="CVE-2016-4268" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4269" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-1049" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1048" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1519" level="MEDIUM"> <product>wave:1.0.1.26</product> </cve> <cve id="CVE-2016-1518" level="MEDIUM"> <product>wave:1.0.1.26</product> </cve> <cve id="CVE-2016-1041" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1040" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1043" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1042" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1045" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1044" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1047" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1046" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-5618" level="MEDIUM"> <product>data_integrator:11.1.1.7.0</product> <product>data_integrator:11.1.1.9.0</product> <product>data_integrator:12.1.2.0.0</product> <product>data_integrator:12.1.3.0.0</product> <product>data_integrator:12.2.1.0.0</product> <product>data_integrator:12.2.1.1.0</product> </cve> <cve id="CVE-2016-5619" level="LOW"> <product>flexcube_universal_banking:11.3.0</product> <product>flexcube_universal_banking:11.4.0</product> <product>flexcube_universal_banking:12.0.1</product> <product>flexcube_universal_banking:12.0.2</product> <product>flexcube_universal_banking:12.0.3</product> <product>flexcube_universal_banking:12.1.0</product> <product>flexcube_universal_banking:12.2.0</product> </cve> <cve id="CVE-2016-5610" level="LOW"> <product>vm_virtualbox:5.0.26</product> <product>vm_virtualbox:5.1.6</product> </cve> <cve id="CVE-2016-5611" level="LOW"> <product>vm_virtualbox:5.0.26</product> <product>vm_virtualbox:5.1.6</product> </cve> <cve id="CVE-2016-5613" level="LOW"> <product>vm_virtualbox:5.0.26</product> <product>vm_virtualbox:5.1.6</product> </cve> <cve id="CVE-2016-5614" level="LOW"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-2967" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2966" level="LOW"> <product>sametime:8.5.1.0</product> <product>sametime:8.5.1.1</product> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2965" level="MEDIUM"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2964" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2963" level="MEDIUM"> <product>bigfix_remote_control:9.1.2</product> </cve> <cve id="CVE-2016-2961" level="LOW"> <product>integration_bus:9.0</product> <product>integration_bus:9.0.0.1</product> <product>integration_bus:9.0.0.2</product> <product>integration_bus:9.0.0.3</product> <product>integration_bus:9.0.0.4</product> <product>integration_bus:9.0.0.5</product> <product>integration_bus:10.0</product> <product>integration_bus:10.0.0.1</product> <product>integration_bus:10.0.0.2</product> <product>integration_bus:10.0.0.3</product> <product>integration_bus:10.0.0.4</product> <product>websphere_message_broker:8.0</product> <product>websphere_message_broker:8.0.0.1</product> <product>websphere_message_broker:8.0.0.2</product> <product>websphere_message_broker:8.0.0.3</product> <product>websphere_message_broker:8.0.0.4</product> <product>websphere_message_broker:8.0.0.5</product> <product>websphere_message_broker:8.0.0.6</product> <product>websphere_message_broker:8.0.0.7</product> </cve> <cve id="CVE-2016-2960" level="MEDIUM"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>websphere_application_server:9.0.0.0</product> </cve> <cve id="CVE-2016-2969" level="LOW"> <product>sametime:8.5.2.0</product> <product>sametime:8.5.2.1</product> <product>sametime:9.0.0.0</product> <product>sametime:9.0.0.1</product> <product>sametime:9.0.1</product> </cve> <cve id="CVE-2016-2968" level="LOW"> <product>security_qradar_incident_forensics:7.2.0</product> <product>security_qradar_incident_forensics:7.2.1</product> <product>security_qradar_incident_forensics:7.2.2</product> <product>security_qradar_incident_forensics:7.2.3</product> <product>security_qradar_incident_forensics:7.2.4</product> <product>security_qradar_incident_forensics:7.2.5</product> <product>security_qradar_incident_forensics:7.2.6</product> </cve> <cve id="CVE-2016-5021" level="LOW"> <product>big-ip_access_policy_manager:11.5.0</product> <product>big-ip_access_policy_manager:11.5.1</product> <product>big-ip_access_policy_manager:11.5.2</product> <product>big-ip_access_policy_manager:11.5.3</product> <product>big-ip_access_policy_manager:11.6.0</product> <product>big-ip_access_policy_manager:12.0.0</product> <product>big-ip_advanced_firewall_manager:11.5.0</product> <product>big-ip_advanced_firewall_manager:11.5.1</product> <product>big-ip_advanced_firewall_manager:11.5.2</product> <product>big-ip_advanced_firewall_manager:11.5.3</product> <product>big-ip_advanced_firewall_manager:11.6.0</product> <product>big-ip_advanced_firewall_manager:12.0.0</product> <product>big-ip_analytics:11.5.0</product> <product>big-ip_analytics:11.5.1</product> <product>big-ip_analytics:11.5.2</product> <product>big-ip_analytics:11.5.3</product> <product>big-ip_analytics:11.6.0</product> <product>big-ip_analytics:12.0.0</product> <product>big-ip_application_acceleration_manager:11.5.0</product> <product>big-ip_application_acceleration_manager:11.5.1</product> <product>big-ip_application_acceleration_manager:11.5.2</product> <product>big-ip_application_acceleration_manager:11.5.3</product> <product>big-ip_application_acceleration_manager:11.6.0</product> <product>big-ip_application_acceleration_manager:12.0.0</product> <product>big-ip_application_security_manager:11.5.0</product> <product>big-ip_application_security_manager:11.5.1</product> <product>big-ip_application_security_manager:11.5.2</product> <product>big-ip_application_security_manager:11.5.3</product> <product>big-ip_application_security_manager:11.6.0</product> <product>big-ip_application_security_manager:12.0.0</product> <product>big-ip_domain_name_system:12.0.0</product> <product>big-ip_global_traffic_manager:11.5.0</product> <product>big-ip_global_traffic_manager:11.5.1</product> <product>big-ip_global_traffic_manager:11.5.2</product> <product>big-ip_global_traffic_manager:11.5.3</product> <product>big-ip_global_traffic_manager:11.6.0</product> <product>big-ip_link_controller:11.5.0</product> <product>big-ip_link_controller:11.5.1</product> <product>big-ip_link_controller:11.5.2</product> <product>big-ip_link_controller:11.5.3</product> <product>big-ip_link_controller:11.6.0</product> <product>big-ip_link_controller:12.0.0</product> <product>big-ip_local_traffic_manager:11.5.0</product> <product>big-ip_local_traffic_manager:11.5.1</product> <product>big-ip_local_traffic_manager:11.5.2</product> <product>big-ip_local_traffic_manager:11.5.3</product> <product>big-ip_local_traffic_manager:11.6.0</product> <product>big-ip_local_traffic_manager:12.0.0</product> <product>big-ip_policy_enforcement_manager:11.5.0</product> <product>big-ip_policy_enforcement_manager:11.5.1</product> <product>big-ip_policy_enforcement_manager:11.5.2</product> <product>big-ip_policy_enforcement_manager:11.5.3</product> <product>big-ip_policy_enforcement_manager:11.6.0</product> <product>big-ip_policy_enforcement_manager:12.0.0</product> <product>big-iq_application_delivery_controller:4.5.0</product> <product>big-iq_centralized_management:4.6.0</product> <product>big-iq_cloud:4.0.0</product> <product>big-iq_cloud:4.1.0</product> <product>big-iq_cloud:4.2.0</product> <product>big-iq_cloud:4.3.0</product> <product>big-iq_cloud:4.4.0</product> <product>big-iq_cloud:4.5.0</product> <product>big-iq_cloud_and_orchestration:1.0.0</product> <product>big-iq_device:4.2.0</product> <product>big-iq_device:4.3.0</product> <product>big-iq_device:4.4.0</product> <product>big-iq_device:4.5.0</product> <product>big-iq_security:4.0.0</product> <product>big-iq_security:4.1.0</product> <product>big-iq_security:4.2.0</product> <product>big-iq_security:4.3.0</product> <product>big-iq_security:4.4.0</product> <product>big-iq_security:4.5.0</product> </cve> <cve id="CVE-2016-8229" level="MEDIUM"> <product>lenovo_service_bridge:-</product> </cve> <cve id="CVE-2016-6321" level="LOW"> <product>tar:1.14</product> <product>tar:1.15</product> <product>tar:1.15.1</product> <product>tar:1.15.90</product> <product>tar:1.15.91</product> <product>tar:1.16</product> <product>tar:1.16.1</product> <product>tar:1.17</product> <product>tar:1.18</product> <product>tar:1.19</product> <product>tar:1.20</product> <product>tar:1.21</product> <product>tar:1.22</product> <product>tar:1.23</product> <product>tar:1.24</product> <product>tar:1.25</product> <product>tar:1.26</product> <product>tar:1.27</product> <product>tar:1.27.1</product> <product>tar:1.28</product> <product>tar:1.29</product> </cve> <cve id="CVE-2016-6452" level="LOW"> <product>prime_home:5.0_base</product> <product>prime_home:5.1_base</product> <product>prime_home:5.2.0</product> </cve> <cve id="CVE-2016-6323" level="LOW"> <product>glibc:2.24</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3130" level="MEDIUM"> <product>enterprise_service:12.0.0</product> <product>enterprise_service:12.0.1</product> <product>enterprise_service:12.1.0</product> <product>enterprise_service:12.2.0</product> <product>enterprise_service:12.2.1</product> <product>enterprise_service:12.3.0</product> <product>enterprise_service:12.3.1</product> <product>enterprise_service:12.4.0</product> <product>enterprise_service:12.4.1</product> <product>enterprise_service:12.5.0a</product> <product>enterprise_service:12.5.1</product> <product>enterprise_service:12.5.2</product> </cve> <cve id="CVE-2016-8221" level="MEDIUM"> <product>xclarity_administrator:1.1.1</product> </cve> <cve id="CVE-2016-2349" level="LOW"> <product>remedy_action_request_system:8.1</product> <product>remedy_action_request_system:9.0</product> <product>remedy_action_request_system:9.0</product> <product>remedy_action_request_system:9.1</product> </cve> <cve id="CVE-2016-2343" level="LOW"> <product>eaglesoft:17.0</product> </cve> <cve id="CVE-2016-5754" level="LOW"> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.1</product> <product>access_manager:4.2</product> <product>access_manager:4.2</product> </cve> <cve id="CVE-2016-2340" level="LOW"> <product>granite_data_services:3.1.1-snapshot</product> </cve> <cve id="CVE-2016-2346" level="MEDIUM"> <product>pl%2fsql_developer:11.0</product> <product>pl%2fsql_developer:11.0.1</product> <product>pl%2fsql_developer:11.0.2</product> <product>pl%2fsql_developer:11.0.3</product> <product>pl%2fsql_developer:11.0.4</product> <product>pl%2fsql_developer:11.0.5</product> </cve> <cve id="CVE-2016-2345" level="LOW"> <product>mini_remote_control:12.0</product> </cve> <cve id="CVE-2016-2344" level="LOW"> <product>autodesk_backburner:2016.0.0.2150</product> </cve> <cve id="CVE-2016-0446" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-4004" level="LOW"> <product>openmanage_server_administrator:8.2</product> </cve> <cve id="CVE-2016-0447" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-4005" level="LOW"> <product>hilink_app:3.19.1</product> </cve> <cve id="CVE-2016-0444" level="MEDIUM"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-0445" level="LOW"> <product>enterprise_manager_grid_control:11.1.0.1</product> <product>enterprise_manager_grid_control:11.2.0.4</product> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-0114" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-8855" level="MEDIUM"> <product>experience_platform:8.1</product> </cve> <cve id="CVE-2016-8856" level="LOW"> <product>reader:2.1.0.0804</product> <product>reader:2.1.0.0805</product> </cve> <cve id="CVE-2016-8859" level="LOW"> <product>musl:1.1.15</product> </cve> <cve id="CVE-2016-8858" level="LOW"> <product>openssh:6.8</product> <product>openssh:6.9</product> <product>openssh:7.0</product> <product>openssh:7.1</product> <product>openssh:7.2</product> <product>openssh:7.3</product> </cve> <cve id="CVE-2016-3640" level="LOW"> <product>hana_db:1.00.091.00.14186593</product> </cve> <cve id="CVE-2016-3315" level="MEDIUM"> <product>onenote:2007</product> <product>onenote:2010</product> <product>onenote:2013</product> <product>onenote:2013</product> <product>onenote:2016</product> <product>onenote_for_mac:2016</product> </cve> <cve id="CVE-2016-3642" level="LOW"> <product>virtualization_manager:6.3.1</product> </cve> <cve id="CVE-2016-6068" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-6065" level="LOW"> <product>security_guardium:8.2</product> <product>security_guardium:9.0</product> <product>security_guardium:9.1</product> <product>security_guardium:9.5</product> <product>security_guardium:10.0</product> <product>security_guardium:10.0.1</product> <product>security_guardium:10.1</product> <product>security_guardium:10.1.2</product> </cve> <cve id="CVE-2016-6062" level="MEDIUM"> <product>resilient:26.0</product> <product>resilient:26.1</product> <product>resilient:26.2</product> </cve> <cve id="CVE-2016-6060" level="LOW"> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_requirements_composer:4.0.1</product> <product>rational_requirements_composer:4.0.2</product> <product>rational_requirements_composer:4.0.3</product> <product>rational_requirements_composer:4.0.4</product> <product>rational_requirements_composer:4.0.5</product> <product>rational_requirements_composer:4.0.6</product> <product>rational_requirements_composer:4.0.7</product> </cve> <cve id="CVE-2016-6061" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> </cve> <cve id="CVE-2016-8938" level="LOW"> <product>urbancode_deploy:6.0</product> <product>urbancode_deploy:6.0.1</product> <product>urbancode_deploy:6.0.1.1</product> <product>urbancode_deploy:6.0.1.2</product> <product>urbancode_deploy:6.0.1.3</product> <product>urbancode_deploy:6.0.1.4</product> <product>urbancode_deploy:6.0.1.5</product> <product>urbancode_deploy:6.0.1.6</product> <product>urbancode_deploy:6.0.1.7</product> <product>urbancode_deploy:6.0.1.8</product> <product>urbancode_deploy:6.0.1.9</product> <product>urbancode_deploy:6.0.1.10</product> <product>urbancode_deploy:6.0.1.11</product> <product>urbancode_deploy:6.0.1.12</product> <product>urbancode_deploy:6.0.1.13</product> <product>urbancode_deploy:6.0.1.14</product> <product>urbancode_deploy:6.1</product> <product>urbancode_deploy:6.1.0.1</product> <product>urbancode_deploy:6.1.0.2</product> <product>urbancode_deploy:6.1.0.3</product> <product>urbancode_deploy:6.1.0.4</product> <product>urbancode_deploy:6.1.1</product> <product>urbancode_deploy:6.1.1.1</product> <product>urbancode_deploy:6.1.1.2</product> <product>urbancode_deploy:6.1.1.3</product> <product>urbancode_deploy:6.1.1.4</product> <product>urbancode_deploy:6.1.1.5</product> <product>urbancode_deploy:6.1.1.6</product> <product>urbancode_deploy:6.1.1.7</product> <product>urbancode_deploy:6.1.1.8</product> <product>urbancode_deploy:6.1.2</product> <product>urbancode_deploy:6.1.3</product> <product>urbancode_deploy:6.1.3.1</product> <product>urbancode_deploy:6.1.3.2</product> <product>urbancode_deploy:6.1.3.3</product> <product>urbancode_deploy:6.2.0.0</product> <product>urbancode_deploy:6.2.0.1</product> <product>urbancode_deploy:6.2.0.2</product> <product>urbancode_deploy:6.2.1</product> <product>urbancode_deploy:6.2.1.1</product> <product>urbancode_deploy:6.2.2</product> <product>urbancode_deploy:6.2.2.1</product> </cve> <cve id="CVE-2016-8939" level="LOW"> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.1.0</product> <product>tivoli_storage_manager:6.1.1</product> <product>tivoli_storage_manager:6.1.2</product> <product>tivoli_storage_manager:6.1.3</product> <product>tivoli_storage_manager:6.1.4</product> <product>tivoli_storage_manager:6.1.5</product> <product>tivoli_storage_manager:6.1.5.4</product> <product>tivoli_storage_manager:6.1.5.5</product> <product>tivoli_storage_manager:6.1.5.6</product> <product>tivoli_storage_manager:6.2.0</product> <product>tivoli_storage_manager:6.2.1</product> <product>tivoli_storage_manager:6.2.2</product> <product>tivoli_storage_manager:6.2.3</product> <product>tivoli_storage_manager:6.2.4</product> <product>tivoli_storage_manager:6.3</product> <product>tivoli_storage_manager:6.3.0.5</product> <product>tivoli_storage_manager:6.3.0.15</product> <product>tivoli_storage_manager:6.3.0.17</product> <product>tivoli_storage_manager:6.3.1</product> <product>tivoli_storage_manager:6.3.1.2</product> <product>tivoli_storage_manager:6.3.2.2</product> <product>tivoli_storage_manager:6.3.3</product> <product>tivoli_storage_manager:6.3.4</product> <product>tivoli_storage_manager:6.3.5</product> <product>tivoli_storage_manager:6.3.5.1</product> <product>tivoli_storage_manager:6.3.6</product> <product>tivoli_storage_manager:6.3.6.100</product> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.0</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.100</product> <product>tivoli_storage_manager:6.4.2.200</product> <product>tivoli_storage_manager:6.4.2.500</product> <product>tivoli_storage_manager:6.4.2.600</product> <product>tivoli_storage_manager:6.4.3</product> <product>tivoli_storage_manager:6.4.3.1</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1..5.100</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.0.3</product> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> <product>tivoli_storage_manager:7.1.6</product> <product>tivoli_storage_manager:7.1.7</product> <product>tivoli_storage_manager:7.1.7.100</product> <product>tivoli_storage_manager:7.1.7.200</product> <product>tivoli_storage_manager:8.1.0</product> <product>tivoli_storage_manager:8.1.1</product> <product>tivoli_storage_manager:8.1.1.100</product> </cve> <cve id="CVE-2016-3647" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-8932" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8933" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8930" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8931" level="LOW"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> <product>kenexa_lms:5.1</product> <product>kenexa_lms:5.2</product> </cve> <cve id="CVE-2016-8936" level="MEDIUM"> <product>social_rendering_templates_for_digital_data_connector:1.0</product> </cve> <cve id="CVE-2016-8937" level="LOW"> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.1.0</product> <product>tivoli_storage_manager:6.1.1</product> <product>tivoli_storage_manager:6.1.2</product> <product>tivoli_storage_manager:6.1.3</product> <product>tivoli_storage_manager:6.1.4</product> <product>tivoli_storage_manager:6.1.5</product> <product>tivoli_storage_manager:6.1.5.4</product> <product>tivoli_storage_manager:6.1.5.5</product> <product>tivoli_storage_manager:6.1.5.6</product> <product>tivoli_storage_manager:6.2.0</product> <product>tivoli_storage_manager:6.2.1</product> <product>tivoli_storage_manager:6.2.2</product> <product>tivoli_storage_manager:6.2.3</product> <product>tivoli_storage_manager:6.2.4</product> <product>tivoli_storage_manager:6.3</product> <product>tivoli_storage_manager:6.3.0.5</product> <product>tivoli_storage_manager:6.3.0.15</product> <product>tivoli_storage_manager:6.3.0.17</product> <product>tivoli_storage_manager:6.3.1</product> <product>tivoli_storage_manager:6.3.1.2</product> <product>tivoli_storage_manager:6.3.2.2</product> <product>tivoli_storage_manager:6.3.3</product> <product>tivoli_storage_manager:6.3.4</product> <product>tivoli_storage_manager:6.3.5</product> <product>tivoli_storage_manager:6.3.5.1</product> <product>tivoli_storage_manager:6.3.6</product> <product>tivoli_storage_manager:6.3.6.100</product> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.0</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.100</product> <product>tivoli_storage_manager:6.4.2.200</product> <product>tivoli_storage_manager:6.4.2.500</product> <product>tivoli_storage_manager:6.4.2.600</product> <product>tivoli_storage_manager:6.4.3</product> <product>tivoli_storage_manager:6.4.3.1</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1..5.100</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.0.3</product> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> <product>tivoli_storage_manager:7.1.6</product> <product>tivoli_storage_manager:7.1.7</product> <product>tivoli_storage_manager:7.1.7.100</product> <product>tivoli_storage_manager:7.1.7.200</product> <product>tivoli_storage_manager:8.1.0</product> <product>tivoli_storage_manager:8.1.1</product> <product>tivoli_storage_manager:8.1.1.100</product> </cve> <cve id="CVE-2016-8934" level="MEDIUM"> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.3</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>websphere_application_server:8.5.5.10</product> <product>websphere_application_server:8.5.5.11</product> <product>websphere_application_server:9.0.0.0</product> <product>websphere_application_server:9.0.0.1</product> <product>websphere_application_server:9.0.0.2</product> </cve> <cve id="CVE-2016-8935" level="MEDIUM"> <product>kenexa_lms:4.1</product> <product>kenexa_lms:4.2</product> <product>kenexa_lms:4.2.2</product> <product>kenexa_lms:4.2.3</product> <product>kenexa_lms:4.2.4</product> <product>kenexa_lms:5.0</product> </cve> <cve id="CVE-2016-7447" level="LOW"> <product>graphicsmagick:1.3.24</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-7446" level="LOW"> <product>graphicsmagick:1.3.24</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-7445" level="LOW"> <product>openjpeg:2.1.1</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-7444" level="LOW"> <product>gnutls:3.4.14</product> <product>gnutls:3.5.0</product> <product>gnutls:3.5.1</product> <product>gnutls:3.5.2</product> <product>gnutls:3.5.3</product> </cve> <cve id="CVE-2016-7443" level="LOW"> <product>exponent_cms:2.3.0</product> <product>exponent_cms:2.3.1</product> <product>exponent_cms:2.3.1</product> <product>exponent_cms:2.3.2</product> <product>exponent_cms:2.3.2</product> <product>exponent_cms:2.3.3</product> <product>exponent_cms:2.3.3</product> <product>exponent_cms:2.3.4</product> <product>exponent_cms:2.3.4</product> <product>exponent_cms:2.3.5</product> <product>exponent_cms:2.3.7</product> <product>exponent_cms:2.3.8</product> </cve> <cve id="CVE-2016-7442" level="LOW"> <product>unified_threat_management_software:9.405-5</product> </cve> <cve id="CVE-2016-7449" level="LOW"> <product>graphicsmagick:1.3.24</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-7448" level="LOW"> <product>graphicsmagick:1.3.24</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3585" level="MEDIUM"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-3582" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3583" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3580" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3581" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-3589" level="MEDIUM"> <product>flexcube_direct_banking:12.0.1</product> <product>flexcube_direct_banking:12.0.2</product> <product>flexcube_direct_banking:12.0.3</product> </cve> <cve id="CVE-2016-0235" level="LOW"> <product>security_guardium_database_activity_monitor:10.0</product> </cve> <cve id="CVE-2016-0589" level="LOW"> <product>application_object_library:11.5.10.2</product> </cve> <cve id="CVE-2016-0588" level="MEDIUM"> <product>general_ledger:11.5.10.2</product> </cve> <cve id="CVE-2016-0231" level="LOW"> <product>financial_transaction_manager:3.0.0.0</product> </cve> <cve id="CVE-2016-0230" level="LOW"> <product>power_hardware_management_console:7.3.0</product> <product>power_hardware_management_console:7.3.0</product> <product>power_hardware_management_console:7.3.0</product> <product>power_hardware_management_console:7.3.0</product> <product>power_hardware_management_console:7.3.0</product> <product>power_hardware_management_console:7.9.0</product> <product>power_hardware_management_console:7.9.0</product> <product>power_hardware_management_console:7.9.0</product> <product>power_hardware_management_console:7.9.0</product> <product>power_hardware_management_console:8.1.0</product> <product>power_hardware_management_console:8.1.0</product> <product>power_hardware_management_console:8.1.0</product> <product>power_hardware_management_console:8.1.0</product> <product>power_hardware_management_console:8.2.0</product> <product>power_hardware_management_console:8.2.0</product> <product>power_hardware_management_console:8.2.0</product> <product>power_hardware_management_console:8.3.0</product> <product>power_hardware_management_console:8.3.0</product> <product>power_hardware_management_console:8.3.0</product> <product>power_hardware_management_console:8.4.0</product> <product>power_hardware_management_console:8.4.0</product> <product>power_hardware_management_console:8.5.0</product> </cve> <cve id="CVE-2016-0233" level="LOW"> <product>marketing_platform:8.5.0.0</product> <product>marketing_platform:8.5.0.1</product> <product>marketing_platform:8.5.0.2</product> <product>marketing_platform:8.5.0.3</product> <product>marketing_platform:8.5.0.4</product> <product>marketing_platform:8.5.0.5</product> <product>marketing_platform:8.5.0.6</product> <product>marketing_platform:8.5.0.7</product> <product>marketing_platform:8.6.0.0</product> <product>marketing_platform:8.6.0.1</product> <product>marketing_platform:8.6.0.2</product> <product>marketing_platform:8.6.0.3</product> <product>marketing_platform:8.6.0.4</product> <product>marketing_platform:8.6.0.5</product> <product>marketing_platform:8.6.0.6</product> <product>marketing_platform:8.6.0.7</product> <product>marketing_platform:8.6.0.8</product> <product>marketing_platform:8.6.0.9</product> <product>marketing_platform:8.6.0.10</product> <product>marketing_platform:8.6.0.11</product> <product>marketing_platform:9.0.0.0</product> <product>marketing_platform:9.0.0.1</product> <product>marketing_platform:9.0.0.2</product> <product>marketing_platform:9.0.0.3</product> <product>marketing_platform:9.0.0.4</product> <product>marketing_platform:9.1.0.0</product> <product>marketing_platform:9.1.0.1</product> <product>marketing_platform:9.1.0.2</product> <product>marketing_platform:9.1.0.3</product> <product>marketing_platform:9.1.0.4</product> <product>marketing_platform:9.1.0.5</product> <product>marketing_platform:9.1.0.6</product> <product>marketing_platform:9.1.0.7</product> <product>marketing_platform:9.1.0.8</product> <product>marketing_platform:9.1.0.9</product> <product>marketing_platform:9.1.0.10</product> <product>marketing_platform:9.1.1.0</product> <product>marketing_platform:9.1.1.1</product> <product>marketing_platform:9.1.1.2</product> <product>marketing_platform:9.1.1.3</product> <product>marketing_platform:9.1.1.4</product> <product>marketing_platform:9.1.2.0</product> </cve> <cve id="CVE-2016-0232" level="LOW"> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> </cve> <cve id="CVE-2016-0583" level="MEDIUM"> <product>crm_technical_foundation:11.5.10.2</product> </cve> <cve id="CVE-2016-0582" level="MEDIUM"> <product>customer_relationship_management_technical_foundation:11.5.10.2</product> </cve> <cve id="CVE-2016-0581" level="LOW"> <product>approvals_management:11.5.10.2</product> </cve> <cve id="CVE-2016-0580" level="LOW"> <product>report_manager:11.5.10.2</product> </cve> <cve id="CVE-2016-0587" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0586" level="MEDIUM"> <product>application_object_library:11.5.10.2</product> </cve> <cve id="CVE-2016-0585" level="LOW"> <product>application_object_library:11.5.10.2</product> </cve> <cve id="CVE-2016-0584" level="MEDIUM"> <product>customer_relationship_management_technical_foundation:11.5.10.2</product> </cve> <cve id="CVE-2016-10008" level="LOW"> <product>dotcms:1.9</product> <product>dotcms:1.9.2.1</product> <product>dotcms:1.9.5.1</product> <product>dotcms:2.0</product> <product>dotcms:2.0.1</product> <product>dotcms:2.1</product> <product>dotcms:2.1.1</product> <product>dotcms:2.2</product> <product>dotcms:2.2.1</product> <product>dotcms:2.3</product> <product>dotcms:2.3.1</product> <product>dotcms:2.3.2</product> <product>dotcms:2.5</product> <product>dotcms:2.5.1</product> <product>dotcms:2.5.2</product> <product>dotcms:2.5.3</product> <product>dotcms:2.5.4</product> <product>dotcms:3.0</product> <product>dotcms:3.0.1</product> <product>dotcms:3.1</product> <product>dotcms:3.2</product> <product>dotcms:3.2.1</product> <product>dotcms:3.2.2</product> <product>dotcms:3.2.3</product> <product>dotcms:3.2.4</product> <product>dotcms:3.3</product> <product>dotcms:3.3.1</product> <product>dotcms:3.3.2</product> <product>dotcms:3.5</product> <product>dotcms:3.5.1</product> <product>dotcms:3.6.0</product> <product>dotcms:3.6.1</product> <product>dotcms:3.6.2</product> <product>dotcms:3.7.0</product> <product>dotcms:3.7.1</product> <product>dotcms:4.0.0</product> <product>dotcms:4.0.1</product> <product>dotcms:4.1.0</product> </cve> <cve id="CVE-2016-4930" level="MEDIUM"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-4931" level="LOW"> <product>junos_space:15.2</product> </cve> <cve id="CVE-2016-8204" level="LOW"> <product>network_advisor:14.0.2</product> </cve> <cve id="CVE-2016-8205" level="LOW"> <product>network_advisor:14.0.2</product> </cve> <cve id="CVE-2016-8206" level="LOW"> <product>network_advisor:14.0.2</product> </cve> <cve id="CVE-2016-8207" level="LOW"> <product>network_advisor:14.0.2</product> </cve> <cve id="CVE-2016-8201" level="MEDIUM"> <product>virtual_traffic_manager:11.0</product> </cve> <cve id="CVE-2016-8202" level="LOW"> <product>fabric_os:7.4.1c</product> <product>fabric_os:8.0.1b</product> </cve> <cve id="CVE-2016-8203" level="LOW"> <product>netiron_os:5.8.00e</product> <product>netiron_os:5.9.00bd</product> <product>netiron_os:6.0.00</product> <product>netiron_os:6.0.00a</product> </cve> <cve id="CVE-2016-8209" level="LOW"> <product>netiron_cer_series_firmware:-</product> <product>netiron_ces_series_firmware:-</product> <product>netiron_mlx_series_firmware:-</product> <product>netiron_xmr_series_firmware:-</product> </cve> <cve id="CVE-2016-0059" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-10532" level="LOW"> <product>console-io:2.2.13</product> </cve> <cve id="CVE-2016-10533" level="LOW"> <product>express-restify-mongoose:2.4.2</product> </cve> <cve id="CVE-2016-10530" level="MEDIUM"> <product>airbrake:0.3.8</product> </cve> <cve id="CVE-2016-10531" level="MEDIUM"> <product>marked:0.3.5</product> </cve> <cve id="CVE-2016-10536" level="MEDIUM"> <product>engine.io-client:1.6.8</product> </cve> <cve id="CVE-2016-10025" level="LOW"> <product>xenserver:6.0.2</product> <product>xenserver:6.2.0</product> <product>xenserver:6.5</product> <product>xenserver:7.0</product> <product>xen:4.6.0</product> <product>xen:4.6.1</product> <product>xen:4.6.3</product> <product>xen:4.6.4</product> <product>xen:4.7.0</product> <product>xen:4.7.1</product> <product>xen:4.8.0</product> </cve> <cve id="CVE-2016-10026" level="LOW"> <product>ikiwiki:3.20161219</product> </cve> <cve id="CVE-2016-10027" level="HIGH"> <product>smack:4.1.8</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-10028" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-10029" level="LOW"> <product>qemu</product> </cve> <cve id="CVE-2016-10539" level="LOW"> <product>negotiator:0.6.0</product> </cve> <cve id="CVE-2016-1184" level="MEDIUM"> <product>tokyo_star_bank:1.3</product> </cve> <cve id="CVE-2016-1185" level="HIGH"> <product>kintone:1.0.0</product> <product>kintone:1.0.1</product> <product>kintone:1.0.2</product> <product>kintone:1.0.3</product> <product>kintone:1.0.4</product> <product>kintone:1.0.5</product> </cve> <cve id="CVE-2016-1186" level="MEDIUM"> <product>kintone:1.0.0</product> <product>kintone:1.0.1</product> <product>kintone:1.0.2</product> <product>kintone:1.0.3</product> <product>kintone:1.0.4</product> <product>kintone:1.0.5</product> </cve> <cve id="CVE-2016-1187" level="MEDIUM"> <product>kunai:2.0.3</product> <product>kunai:2.0.3.1</product> <product>kunai:2.0.4</product> <product>kunai:2.0.5</product> <product>kunai:2.1.0</product> <product>kunai:2.1.1</product> <product>kunai:2.1.2</product> <product>kunai:2.1.3</product> <product>kunai:3.0.0</product> <product>kunai:3.0.0</product> <product>kunai:3.0.1</product> <product>kunai:3.0.1</product> <product>kunai:3.0.2</product> <product>kunai:3.0.2</product> <product>kunai:3.0.3</product> <product>kunai:3.0.3</product> <product>kunai:3.0.4</product> <product>kunai:3.0.4</product> <product>kunai:3.0.6</product> <product>kunai:3.0.7</product> <product>kunai:3.0._5</product> <product>kunai:3.1.0</product> <product>kunai:3.1.1</product> <product>kunai:3.1.2</product> <product>kunai:3.1.3</product> <product>kunai:3.1.4</product> <product>kunai:3.1.5</product> </cve> <cve id="CVE-2016-1180" level="MEDIUM"> <product>social-button_premium:1.0</product> </cve> <cve id="CVE-2016-1181" level="MEDIUM"> <product>struts:1.0</product> <product>struts:1.0.2</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.2.2</product> <product>struts:1.2.4</product> <product>struts:1.2.6</product> <product>struts:1.2.7</product> <product>struts:1.2.8</product> <product>struts:1.2.9</product> <product>struts:1.3.5</product> <product>struts:1.3.8</product> <product>struts:1.3.10</product> <product>banking_platform:2.3.0</product> <product>banking_platform:2.4.0</product> <product>banking_platform:2.4.1</product> <product>banking_platform:2.5.0</product> <product>portal:11.1.1.6</product> </cve> <cve id="CVE-2016-1182" level="LOW"> <product>struts:1.0</product> <product>struts:1.0.2</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.1</product> <product>struts:1.2.2</product> <product>struts:1.2.4</product> <product>struts:1.2.6</product> <product>struts:1.2.7</product> <product>struts:1.2.8</product> <product>struts:1.2.9</product> <product>struts:1.3.5</product> <product>struts:1.3.8</product> <product>struts:1.3.10</product> </cve> <cve id="CVE-2016-1183" level="MEDIUM"> <product>terasoluna_server_framework_for_java_web:2.0.0.1</product> <product>terasoluna_server_framework_for_java_web:2.0.0.2</product> <product>terasoluna_server_framework_for_java_web:2.0.1.0</product> <product>terasoluna_server_framework_for_java_web:2.0.2.0</product> <product>terasoluna_server_framework_for_java_web:2.0.5.1</product> <product>terasoluna_server_framework_for_java_web:2.0.5.2</product> <product>terasoluna_server_framework_for_java_web:2.0.5.3</product> <product>terasoluna_server_framework_for_java_web:2.0.6.1</product> </cve> <cve id="CVE-2016-1188" level="LOW"> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-1189" level="LOW"> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> </cve> <cve id="CVE-2016-2570" level="LOW"> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0.stable1</product> <product>squid:3.0.stable2</product> <product>squid:3.0.stable3</product> <product>squid:3.0.stable4</product> <product>squid:3.0.stable5</product> <product>squid:3.0.stable6</product> <product>squid:3.0.stable7</product> <product>squid:3.0.stable8</product> <product>squid:3.0.stable9</product> <product>squid:3.0.stable10</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable12</product> <product>squid:3.0.stable13</product> <product>squid:3.0.stable14</product> <product>squid:3.0.stable15</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable17</product> <product>squid:3.0.stable18</product> <product>squid:3.0.stable19</product> <product>squid:3.0.stable20</product> <product>squid:3.0.stable21</product> <product>squid:3.0.stable22</product> <product>squid:3.0.stable23</product> <product>squid:3.0.stable24</product> <product>squid:3.0.stable25</product> <product>squid:3.1</product> <product>squid:3.1.0.1</product> <product>squid:3.1.0.2</product> <product>squid:3.1.0.3</product> <product>squid:3.1.0.4</product> <product>squid:3.1.0.5</product> <product>squid:3.1.0.6</product> <product>squid:3.1.0.7</product> <product>squid:3.1.0.8</product> <product>squid:3.1.0.9</product> <product>squid:3.1.0.10</product> <product>squid:3.1.0.11</product> <product>squid:3.1.0.12</product> <product>squid:3.1.0.13</product> <product>squid:3.1.0.14</product> <product>squid:3.1.0.15</product> <product>squid:3.1.0.16</product> <product>squid:3.1.0.17</product> <product>squid:3.1.0.18</product> <product>squid:3.1.1</product> <product>squid:3.1.2</product> <product>squid:3.1.3</product> <product>squid:3.1.4</product> <product>squid:3.1.5</product> <product>squid:3.1.5.1</product> <product>squid:3.1.6</product> <product>squid:3.1.7</product> <product>squid:3.1.8</product> <product>squid:3.1.9</product> <product>squid:3.1.10</product> <product>squid:3.1.11</product> <product>squid:3.1.12</product> <product>squid:3.1.13</product> <product>squid:3.1.14</product> <product>squid:3.1.15</product> <product>squid:3.2.0.1</product> <product>squid:3.2.0.2</product> <product>squid:3.2.0.3</product> <product>squid:3.2.0.4</product> <product>squid:3.2.0.5</product> <product>squid:3.2.0.6</product> <product>squid:3.2.0.7</product> <product>squid:3.2.0.8</product> <product>squid:3.2.0.9</product> <product>squid:3.2.0.10</product> <product>squid:3.2.0.11</product> <product>squid:3.2.0.12</product> <product>squid:3.2.0.13</product> <product>squid:3.2.0.14</product> <product>squid:3.2.0.15</product> <product>squid:3.2.0.16</product> <product>squid:3.2.0.17</product> <product>squid:3.2.0.18</product> <product>squid:3.2.0.19</product> <product>squid:3.2.1</product> <product>squid:3.2.2</product> <product>squid:3.2.3</product> <product>squid:3.2.4</product> <product>squid:3.2.5</product> <product>squid:3.2.6</product> <product>squid:3.2.7</product> <product>squid:3.2.8</product> <product>squid:3.2.9</product> <product>squid:3.2.10</product> <product>squid:3.2.11</product> <product>squid:3.2.12</product> <product>squid:3.2.13</product> <product>squid:3.3.0</product> <product>squid:3.3.0.2</product> <product>squid:3.3.0.3</product> <product>squid:3.3.1</product> <product>squid:3.3.2</product> <product>squid:3.3.3</product> <product>squid:3.3.4</product> <product>squid:3.3.5</product> <product>squid:3.3.6</product> <product>squid:3.3.7</product> <product>squid:3.3.8</product> <product>squid:3.3.9</product> <product>squid:3.3.10</product> <product>squid:3.3.11</product> <product>squid:3.3.12</product> <product>squid:3.3.13</product> <product>squid:3.4.0.1</product> <product>squid:3.4.0.2</product> <product>squid:3.4.0.3</product> <product>squid:3.4.1</product> <product>squid:3.4.2</product> <product>squid:3.4.3</product> <product>squid:3.4.4</product> <product>squid:3.4.8</product> <product>squid:3.4.9</product> <product>squid:3.4.10</product> <product>squid:3.4.11</product> <product>squid:3.4.12</product> <product>squid:3.4.13</product> <product>squid:3.5.0.1</product> <product>squid:3.5.0.2</product> <product>squid:3.5.0.3</product> <product>squid:3.5.0.4</product> <product>squid:3.5.1</product> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> </cve> <cve id="CVE-2016-2571" level="LOW"> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0</product> <product>squid:3.0.stable1</product> <product>squid:3.0.stable2</product> <product>squid:3.0.stable3</product> <product>squid:3.0.stable4</product> <product>squid:3.0.stable5</product> <product>squid:3.0.stable6</product> <product>squid:3.0.stable7</product> <product>squid:3.0.stable8</product> <product>squid:3.0.stable9</product> <product>squid:3.0.stable10</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable11</product> <product>squid:3.0.stable12</product> <product>squid:3.0.stable13</product> <product>squid:3.0.stable14</product> <product>squid:3.0.stable15</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable16</product> <product>squid:3.0.stable17</product> <product>squid:3.0.stable18</product> <product>squid:3.0.stable19</product> <product>squid:3.0.stable20</product> <product>squid:3.0.stable21</product> <product>squid:3.0.stable22</product> <product>squid:3.0.stable23</product> <product>squid:3.0.stable24</product> <product>squid:3.0.stable25</product> <product>squid:3.1</product> <product>squid:3.1.0.1</product> <product>squid:3.1.0.2</product> <product>squid:3.1.0.3</product> <product>squid:3.1.0.4</product> <product>squid:3.1.0.5</product> <product>squid:3.1.0.6</product> <product>squid:3.1.0.7</product> <product>squid:3.1.0.8</product> <product>squid:3.1.0.9</product> <product>squid:3.1.0.10</product> <product>squid:3.1.0.11</product> <product>squid:3.1.0.12</product> <product>squid:3.1.0.13</product> <product>squid:3.1.0.14</product> <product>squid:3.1.0.15</product> <product>squid:3.1.0.16</product> <product>squid:3.1.0.17</product> <product>squid:3.1.0.18</product> <product>squid:3.1.1</product> <product>squid:3.1.2</product> <product>squid:3.1.3</product> <product>squid:3.1.4</product> <product>squid:3.1.5</product> <product>squid:3.1.5.1</product> <product>squid:3.1.6</product> <product>squid:3.1.7</product> <product>squid:3.1.8</product> <product>squid:3.1.9</product> <product>squid:3.1.10</product> <product>squid:3.1.11</product> <product>squid:3.1.12</product> <product>squid:3.1.13</product> <product>squid:3.1.14</product> <product>squid:3.1.15</product> <product>squid:3.2.0.1</product> <product>squid:3.2.0.2</product> <product>squid:3.2.0.3</product> <product>squid:3.2.0.4</product> <product>squid:3.2.0.5</product> <product>squid:3.2.0.6</product> <product>squid:3.2.0.7</product> <product>squid:3.2.0.8</product> <product>squid:3.2.0.9</product> <product>squid:3.2.0.10</product> <product>squid:3.2.0.11</product> <product>squid:3.2.0.12</product> <product>squid:3.2.0.13</product> <product>squid:3.2.0.14</product> <product>squid:3.2.0.15</product> <product>squid:3.2.0.16</product> <product>squid:3.2.0.17</product> <product>squid:3.2.0.18</product> <product>squid:3.2.0.19</product> <product>squid:3.2.1</product> <product>squid:3.2.2</product> <product>squid:3.2.3</product> <product>squid:3.2.4</product> <product>squid:3.2.5</product> <product>squid:3.2.6</product> <product>squid:3.2.7</product> <product>squid:3.2.8</product> <product>squid:3.2.9</product> <product>squid:3.2.10</product> <product>squid:3.2.11</product> <product>squid:3.2.12</product> <product>squid:3.2.13</product> <product>squid:3.3.0</product> <product>squid:3.3.0.2</product> <product>squid:3.3.0.3</product> <product>squid:3.3.1</product> <product>squid:3.3.2</product> <product>squid:3.3.3</product> <product>squid:3.3.4</product> <product>squid:3.3.5</product> <product>squid:3.3.6</product> <product>squid:3.3.7</product> <product>squid:3.3.8</product> <product>squid:3.3.9</product> <product>squid:3.3.10</product> <product>squid:3.3.11</product> <product>squid:3.3.12</product> <product>squid:3.3.13</product> <product>squid:3.4.0.1</product> <product>squid:3.4.0.2</product> <product>squid:3.4.0.3</product> <product>squid:3.4.1</product> <product>squid:3.4.2</product> <product>squid:3.4.3</product> <product>squid:3.4.4</product> <product>squid:3.4.8</product> <product>squid:3.4.9</product> <product>squid:3.4.10</product> <product>squid:3.4.11</product> <product>squid:3.4.12</product> <product>squid:3.4.13</product> <product>squid:3.5.0.1</product> <product>squid:3.5.0.2</product> <product>squid:3.5.0.3</product> <product>squid:3.5.0.4</product> <product>squid:3.5.1</product> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> </cve> <cve id="CVE-2016-2572" level="LOW"> <product>squid:4.0.1</product> <product>squid:4.0.2</product> <product>squid:4.0.3</product> <product>squid:4.0.4</product> <product>squid:4.0.5</product> <product>squid:4.0.6</product> </cve> <cve id="CVE-2016-4754" level="LOW"> <product>os_x_server:5.1</product> </cve> <cve id="CVE-2016-5409" level="LOW"> <product>openshift:2.0</product> </cve> <cve id="CVE-2016-5407" level="LOW"> <product>libxv:1.0.10</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-5406" level="LOW"> <product>jboss_enterprise_application_platform:7.0.1</product> </cve> <cve id="CVE-2016-5401" level="MEDIUM"> <product>jboss_bpm_suite:6.0.0</product> <product>jboss_enterprise_brms_platform:6.0.0</product> </cve> <cve id="CVE-2016-6273" level="LOW"> <product>license_server:11.14.0.0</product> <product>license_server_vpx:11.14.0.0</product> </cve> <cve id="CVE-2016-6272" level="LOW"> <product>mychart:-</product> </cve> <cve id="CVE-2016-6271" level="LOW"> <product>bzrtp:1.0.0</product> <product>bzrtp:1.0.2</product> <product>bzrtp:1.0.3</product> </cve> <cve id="CVE-2016-6270" level="LOW"> <product>virtual_mobile_infrastructure:5.0</product> </cve> <cve id="CVE-2016-6277" level="MEDIUM"> <product>d6220_firmware:1.0.0.22</product> <product>d6400_firmware:1.0.0.56</product> <product>r6250_firmware:1.0.4.6_10.1.12</product> <product>r6400_firmware:1.0.1.18</product> <product>r6700_firmware:1.0.1.14</product> <product>r6900_firmware:1.0.1.14</product> <product>r7000_firmware:1.0.7.2_1.1.93</product> <product>r7100lg_firmware:1.0.0.28</product> <product>r7300dst_firmware:1.0.0.46</product> <product>r7900_firmware:1.0.1.8</product> <product>r8000_firmware:1.0.3.26</product> </cve> <cve id="CVE-2016-7583" level="LOW"> <product>icloud:6.0.0</product> </cve> <cve id="CVE-2016-6189" level="LOW"> <product>sogo:2.3.11</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.0</product> <product>sogo:3.0.1</product> <product>sogo:3.0.2</product> <product>sogo:3.1.0</product> </cve> <cve id="CVE-2016-6188" level="LOW"> <product>sogo:2..3.7</product> </cve> <cve id="CVE-2016-6181" level="MEDIUM"> <product>honor_4c_firmware:chm-tl00c01_b535</product> <product>honor_4c_firmware:chm-tl00c01b556</product> <product>honor_4c_firmware:chm-tl00hc00_b535</product> <product>honor_4c_firmware:chm-tl00hc00b556</product> <product>honor_4c_firmware:chm-ul00c00b535</product> <product>honor_4c_firmware:chm-ul00c00b556</product> </cve> <cve id="CVE-2016-6180" level="MEDIUM"> <product>honor_4c_firmware:chm-tl00c01_b535</product> <product>honor_4c_firmware:chm-tl00c01b556</product> <product>honor_4c_firmware:chm-tl00hc00_b535</product> <product>honor_4c_firmware:chm-tl00hc00b556</product> <product>honor_4c_firmware:chm-ul00c00b535</product> <product>honor_4c_firmware:chm-ul00c00b556</product> </cve> <cve id="CVE-2016-6183" level="MEDIUM"> <product>honor_4c_firmware:chm-tl00c01_b535</product> <product>honor_4c_firmware:chm-tl00c01b556</product> <product>honor_4c_firmware:chm-tl00hc00_b535</product> <product>honor_4c_firmware:chm-tl00hc00b556</product> <product>honor_4c_firmware:chm-ul00c00b535</product> <product>honor_4c_firmware:chm-ul00c00b556</product> </cve> <cve id="CVE-2016-6182" level="MEDIUM"> <product>honor_4c_firmware:chm-tl00c01_b535</product> <product>honor_4c_firmware:chm-tl00c01b556</product> <product>honor_4c_firmware:chm-tl00hc00_b535</product> <product>honor_4c_firmware:chm-tl00hc00b556</product> <product>honor_4c_firmware:chm-ul00c00b535</product> <product>honor_4c_firmware:chm-ul00c00b556</product> </cve> <cve id="CVE-2016-6184" level="MEDIUM"> <product>honor_4c_firmware:chm-tl00c01_b535</product> <product>honor_4c_firmware:chm-tl00c01b556</product> <product>honor_4c_firmware:chm-tl00hc00_b535</product> <product>honor_4c_firmware:chm-tl00hc00b556</product> <product>honor_4c_firmware:chm-ul00c00b535</product> <product>honor_4c_firmware:chm-ul00c00b556</product> </cve> <cve id="CVE-2016-10709" level="LOW"> <product>pfsense:2.2.6</product> </cve> <cve id="CVE-2016-10701" level="MEDIUM"> <product>pentaho_business_analytics:8.0</product> </cve> <cve id="CVE-2016-10700" level="LOW"> <product>cacti:0.8</product> <product>cacti:0.8.1</product> <product>cacti:0.8.2</product> <product>cacti:0.8.2a</product> <product>cacti:0.8.3</product> <product>cacti:0.8.3a</product> <product>cacti:0.8.4</product> <product>cacti:0.8.5</product> <product>cacti:0.8.5a</product> <product>cacti:0.8.6</product> <product>cacti:0.8.6a</product> <product>cacti:0.8.6b</product> <product>cacti:0.8.6c</product> <product>cacti:0.8.6d</product> <product>cacti:0.8.6e</product> <product>cacti:0.8.6f</product> <product>cacti:0.8.6g</product> <product>cacti:0.8.6h</product> <product>cacti:0.8.6i</product> <product>cacti:0.8.6j</product> <product>cacti:0.8.6k</product> <product>cacti:0.8.7</product> <product>cacti:0.8.7a</product> <product>cacti:0.8.7b</product> <product>cacti:0.8.7c</product> <product>cacti:0.8.7d</product> <product>cacti:0.8.7e</product> <product>cacti:0.8.7f</product> <product>cacti:0.8.7g</product> <product>cacti:0.8.7h</product> <product>cacti:0.8.7i</product> <product>cacti:0.8.8</product> <product>cacti:0.8.8a</product> <product>cacti:0.8.8b</product> <product>cacti:0.8.8c</product> <product>cacti:0.8.8d</product> <product>cacti:0.8.8f</product> <product>cacti:0.8.8g</product> </cve> <cve id="CVE-2016-10702" level="MEDIUM"> <product>pebble_firmware:4.3</product> </cve> <cve id="CVE-2016-10705" level="MEDIUM"> <product>jetpack:4.0.3</product> </cve> <cve id="CVE-2016-10704" level="MEDIUM"> <product>magento:1.9.1.0</product> <product>magento:1.9.2.2</product> <product>magento:1.14.1.0</product> <product>magento:1.14.2.2</product> </cve> <cve id="CVE-2016-10707" level="LOW"> <product>jquery:3.0.0</product> </cve> <cve id="CVE-2016-10706" level="MEDIUM"> <product>jetpack:1.2</product> <product>jetpack:1.2.1</product> <product>jetpack:1.2.2</product> <product>jetpack:1.2.3</product> <product>jetpack:1.2.4</product> <product>jetpack:1.3</product> <product>jetpack:1.3.1</product> <product>jetpack:1.3.2</product> <product>jetpack:1.3.3</product> <product>jetpack:1.3.4</product> <product>jetpack:1.4</product> <product>jetpack:1.4.1</product> <product>jetpack:1.4.2</product> <product>jetpack:1.5</product> <product>jetpack:1.6</product> <product>jetpack:1.6.1</product> <product>jetpack:1.7</product> <product>jetpack:1.8</product> <product>jetpack:1.8.1</product> <product>jetpack:1.8.2</product> <product>jetpack:1.8.3</product> <product>jetpack:1.9</product> <product>jetpack:1.9.1</product> <product>jetpack:1.9.2</product> <product>jetpack:2.0</product> <product>jetpack:2.0.1</product> <product>jetpack:2.0.2</product> <product>jetpack:2.0.3</product> <product>jetpack:2.0.4</product> <product>jetpack:2.1</product> <product>jetpack:2.1.1</product> <product>jetpack:2.1.2</product> <product>jetpack:2.2</product> <product>jetpack:2.2.1</product> <product>jetpack:2.2.2</product> <product>jetpack:2.2.3</product> <product>jetpack:2.2.4</product> <product>jetpack:2.2.5</product> <product>jetpack:2.3</product> <product>jetpack:2.3.1</product> <product>jetpack:2.3.2</product> <product>jetpack:2.3.3</product> <product>jetpack:2.3.4</product> <product>jetpack:2.3.5</product> <product>jetpack:2.4</product> <product>jetpack:2.4.1</product> <product>jetpack:2.4.2</product> <product>jetpack:2.5</product> <product>jetpack:2.6</product> <product>jetpack:2.6.1</product> <product>jetpack:2.7</product> <product>jetpack:2.8</product> <product>jetpack:2.9</product> <product>jetpack:2.9.1</product> <product>jetpack:2.9.2</product> <product>jetpack:2.9.3</product> </cve> <cve id="CVE-2016-2884" level="MEDIUM"> <product>forms_experience_builder:8.5.0.0</product> <product>forms_experience_builder:8.5.1.0</product> <product>forms_experience_builder:8.5.1.1</product> <product>forms_experience_builder:8.6.0.0</product> <product>forms_experience_builder:8.6.1</product> <product>forms_experience_builder:8.6.1.1</product> <product>forms_experience_builder:8.6.2</product> <product>forms_experience_builder:8.6.2.1</product> <product>forms_experience_builder:8.6.3</product> </cve> <cve id="CVE-2016-6988" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-2887" level="LOW"> <product>ims_enterprise_suite:3.2.0.0</product> </cve> <cve id="CVE-2016-7054" level="LOW"> <product>openssl:1.1.0</product> <product>openssl:1.1.0a</product> <product>openssl:1.1.0b</product> </cve> <cve id="CVE-2016-7055" level="HIGH"> <product>openssl:1.0.2</product> <product>openssl:1.1.0b</product> </cve> <cve id="CVE-2016-7051" level="LOW"> <product>jackson:2.7.7</product> <product>jackson:2.8.0</product> <product>jackson:2.8.0</product> <product>jackson:2.8.0</product> <product>jackson:2.8.1</product> <product>jackson:2.8.2</product> <product>jackson:2.8.3</product> </cve> <cve id="CVE-2016-7052" level="LOW"> <product>openssl:1.0.2i</product> <product>suse_linux_enterprise_module_for_web_scripting:12.0</product> </cve> <cve id="CVE-2016-7053" level="LOW"> <product>openssl:1.1.0</product> <product>openssl:1.1.0a</product> <product>openssl:1.1.0b</product> </cve> <cve id="CVE-2016-3248" level="MEDIUM"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3245" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3244" level="MEDIUM"> <product>edge</product> </cve> <cve id="CVE-2016-3247" level="HIGH"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3246" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-3241" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3240" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3243" level="HIGH"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3242" level="HIGH"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-1067" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1066" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1065" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1064" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1063" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1062" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1061" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1060" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1069" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1068" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-5980" level="MEDIUM"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.2</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.0.1</product> <product>tririga_application_platform:3.4.1.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.4.2.3</product> <product>tririga_application_platform:3.4.2.4</product> <product>tririga_application_platform:3.5.0.0</product> <product>tririga_application_platform:3.5.0.1</product> <product>tririga_application_platform:3.5.1.0</product> <product>tririga_application_platform:3.5.1.1</product> </cve> <cve id="CVE-2016-5981" level="MEDIUM"> <product>filenet_workplace:4.0.2.14-p8ae-if001</product> <product>filenet_workplace_xt:1.1.5.2-wpxt-la011</product> </cve> <cve id="CVE-2016-5983" level="LOW"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>websphere_application_server:8.5.5.10</product> <product>websphere_application_server:9.0.0.0</product> <product>websphere_application_server:9.0.0.1</product> </cve> <cve id="CVE-2016-5984" level="MEDIUM"> <product>infosphere_information_server:8.7</product> <product>infosphere_information_server:9.1</product> <product>infosphere_information_server:11.3</product> <product>infosphere_information_server:11.5</product> <product>infosphere_information_server_on_cloud:11.5</product> </cve> <cve id="CVE-2016-5985" level="LOW"> <product>tivoli_storage_manager:5.5</product> <product>tivoli_storage_manager:6.1</product> <product>tivoli_storage_manager:6.2</product> <product>tivoli_storage_manager:6.3.0.0</product> <product>tivoli_storage_manager:6.3.2.5</product> <product>tivoli_storage_manager:6.4.0.0</product> <product>tivoli_storage_manager:6.4.3.3</product> <product>tivoli_storage_manager:7.1.0.0</product> <product>tivoli_storage_manager:7.1.6.2</product> </cve> <cve id="CVE-2016-5986" level="LOW"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:7.0.0.0</product> <product>websphere_application_server:7.0.0.1</product> <product>websphere_application_server:7.0.0.2</product> <product>websphere_application_server:7.0.0.3</product> <product>websphere_application_server:7.0.0.4</product> <product>websphere_application_server:7.0.0.5</product> <product>websphere_application_server:7.0.0.6</product> <product>websphere_application_server:7.0.0.7</product> <product>websphere_application_server:7.0.0.8</product> <product>websphere_application_server:7.0.0.9</product> <product>websphere_application_server:7.0.0.10</product> <product>websphere_application_server:7.0.0.11</product> <product>websphere_application_server:7.0.0.12</product> <product>websphere_application_server:7.0.0.13</product> <product>websphere_application_server:7.0.0.14</product> <product>websphere_application_server:7.0.0.15</product> <product>websphere_application_server:7.0.0.16</product> <product>websphere_application_server:7.0.0.17</product> <product>websphere_application_server:7.0.0.18</product> <product>websphere_application_server:7.0.0.19</product> <product>websphere_application_server:7.0.0.21</product> <product>websphere_application_server:7.0.0.22</product> <product>websphere_application_server:7.0.0.23</product> <product>websphere_application_server:7.0.0.24</product> <product>websphere_application_server:7.0.0.25</product> <product>websphere_application_server:7.0.0.27</product> <product>websphere_application_server:7.0.0.28</product> <product>websphere_application_server:7.0.0.29</product> <product>websphere_application_server:7.0.0.31</product> <product>websphere_application_server:7.0.0.32</product> <product>websphere_application_server:7.0.0.33</product> <product>websphere_application_server:7.0.0.34</product> <product>websphere_application_server:7.0.0.35</product> <product>websphere_application_server:7.0.0.36</product> <product>websphere_application_server:7.0.0.37</product> <product>websphere_application_server:7.0.0.38</product> <product>websphere_application_server:7.0.0.39</product> <product>websphere_application_server:7.0.0.41</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.0.0.0</product> <product>websphere_application_server:8.0.0.1</product> <product>websphere_application_server:8.0.0.2</product> <product>websphere_application_server:8.0.0.3</product> <product>websphere_application_server:8.0.0.4</product> <product>websphere_application_server:8.0.0.5</product> <product>websphere_application_server:8.0.0.6</product> <product>websphere_application_server:8.0.0.7</product> <product>websphere_application_server:8.0.0.8</product> <product>websphere_application_server:8.0.0.9</product> <product>websphere_application_server:8.0.0.10</product> <product>websphere_application_server:8.0.0.11</product> <product>websphere_application_server:8.0.0.12</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.0</product> <product>websphere_application_server:8.5.0.1</product> <product>websphere_application_server:8.5.0.2</product> <product>websphere_application_server:8.5.5.0</product> <product>websphere_application_server:8.5.5.1</product> <product>websphere_application_server:8.5.5.2</product> <product>websphere_application_server:8.5.5.4</product> <product>websphere_application_server:8.5.5.5</product> <product>websphere_application_server:8.5.5.6</product> <product>websphere_application_server:8.5.5.7</product> <product>websphere_application_server:8.5.5.8</product> <product>websphere_application_server:8.5.5.9</product> <product>websphere_application_server:8.5.5.10</product> <product>websphere_application_server:9.0.0.0</product> <product>websphere_application_server:9.0.0.1</product> </cve> <cve id="CVE-2016-5987" level="LOW"> <product>maximo_asset_management:7.1.0.0</product> <product>maximo_asset_management:7.1.1</product> <product>maximo_asset_management:7.1.1.1</product> <product>maximo_asset_management:7.1.1.2</product> <product>maximo_asset_management:7.1.1.3</product> <product>maximo_asset_management:7.1.1.5</product> <product>maximo_asset_management:7.1.1.6</product> <product>maximo_asset_management:7.1.1.7</product> <product>maximo_asset_management:7.1.1.8</product> <product>maximo_asset_management:7.1.1.9</product> <product>maximo_asset_management:7.1.1.10</product> <product>maximo_asset_management:7.1.1.11</product> <product>maximo_asset_management:7.1.1.12</product> <product>maximo_asset_management:7.1.1.13</product> <product>maximo_asset_management:7.1.2</product> <product>maximo_asset_management:7.5.0.0</product> <product>maximo_asset_management:7.5.0.1</product> <product>maximo_asset_management:7.5.0.2</product> <product>maximo_asset_management:7.5.0.3</product> <product>maximo_asset_management:7.5.0.4</product> <product>maximo_asset_management:7.5.0.5</product> <product>maximo_asset_management:7.5.0.6</product> <product>maximo_asset_management:7.5.0.7</product> <product>maximo_asset_management:7.5.0.8</product> <product>maximo_asset_management:7.5.0.9</product> <product>maximo_asset_management:7.5.0.10</product> <product>maximo_asset_management:7.6.0.0</product> <product>maximo_asset_management:7.6.0.1</product> <product>maximo_asset_management:7.6.0.2</product> <product>maximo_asset_management:7.6.0.3</product> <product>maximo_asset_management:7.6.0.4</product> </cve> <cve id="CVE-2016-5988" level="LOW"> <product>security_privileged_identity_manager:2.0.2</product> <product>security_privileged_identity_manager:2.1</product> </cve> <cve id="CVE-2016-1241" level="MEDIUM"> <product>tryton:3.2.0</product> <product>tryton:3.2.16</product> <product>tryton:3.4.0</product> <product>tryton:3.4.1</product> <product>tryton:3.4.2</product> <product>tryton:3.4.3</product> <product>tryton:3.4.4</product> <product>tryton:3.4.5</product> <product>tryton:3.4.6</product> <product>tryton:3.4.7</product> <product>tryton:3.4.8</product> <product>tryton:3.4.9</product> <product>tryton:3.4.10</product> <product>tryton:3.4.11</product> <product>tryton:3.4.12</product> <product>tryton:3.4.13</product> <product>tryton:3.6.0</product> <product>tryton:3.6.1</product> <product>tryton:3.6.2</product> <product>tryton:3.6.3</product> <product>tryton:3.6.4</product> <product>tryton:3.6.5</product> <product>tryton:3.6.6</product> <product>tryton:3.6.7</product> <product>tryton:3.6.8</product> <product>tryton:3.6.9</product> <product>tryton:3.6.10</product> <product>tryton:3.6.11</product> <product>tryton:3.8.0</product> <product>tryton:3.8.1</product> <product>tryton:3.8.2</product> <product>tryton:3.8.3</product> <product>tryton:3.8.4</product> <product>tryton:3.8.5</product> <product>tryton:3.8.6</product> <product>tryton:3.8.7</product> <product>tryton:4.0.0</product> <product>tryton:4.0.1</product> <product>tryton:4.0.2</product> <product>tryton:4.0.3</product> </cve> <cve id="CVE-2016-1247" level="LOW"> <product>nginx:1.4.3</product> <product>nginx:1.6.2</product> <product>nginx:1.10.0</product> <product>nginx:1.10.1</product> </cve> <cve id="CVE-2016-1249" level="MEDIUM"> <product>dbd-mysql:4.038_01</product> </cve> <cve id="CVE-2016-3454" level="HIGH"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-1000219" level="LOW"> <product>kibana:4.1.10</product> <product>kibana:4.5.3</product> </cve> <cve id="CVE-2016-1000218" level="MEDIUM"> <product>kibana_reporting:2.4.0</product> </cve> <cve id="CVE-2016-3455" level="LOW"> <product>outside_in_technology:8.5.0</product> <product>outside_in_technology:8.5.1</product> <product>outside_in_technology:8.5.2</product> </cve> <cve id="CVE-2016-1000215" level="LOW"> <product>wireless_h500:-</product> </cve> <cve id="CVE-2016-1000214" level="LOW"> <product>wireless_h500:-</product> </cve> <cve id="CVE-2016-1000217" level="LOW"> <product>zotpress:6.1.2</product> </cve> <cve id="CVE-2016-1000216" level="LOW"> <product>wireless_h500:-</product> </cve> <cve id="CVE-2016-9892" level="MEDIUM"> <product>endpoint_antivirus:6.3.70.1</product> <product>endpoint_security:6.3.70.1</product> </cve> <cve id="CVE-2016-3456" level="MEDIUM"> <product>complex_maintenance_repair_and_overhaul:12.1.1</product> <product>complex_maintenance_repair_and_overhaul:12.1.2</product> <product>complex_maintenance_repair_and_overhaul:12.1.3</product> </cve> <cve id="CVE-2016-1000213" level="MEDIUM"> <product>wireless_h500:-</product> </cve> <cve id="CVE-2016-9891" level="MEDIUM"> <product>dotclear:2.10.4</product> </cve> <cve id="CVE-2016-3457" level="MEDIUM"> <product>peoplesoft_enterprise_human_capital_management_eperformance:9.2</product> </cve> <cve id="CVE-2016-3450" level="MEDIUM"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-3451" level="MEDIUM"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5365" level="LOW"> <product>honor_ws851_firmware:1.1.21.1</product> </cve> <cve id="CVE-2016-5366" level="LOW"> <product>honor_ws851_firmware:1.1.21.1</product> </cve> <cve id="CVE-2016-5367" level="LOW"> <product>honor_ws851_firmware:1.1.21.1</product> </cve> <cve id="CVE-2016-5361" level="LOW"> <product>libreswan:3.16</product> </cve> <cve id="CVE-2016-5362" level="LOW"> <product>neutron:7.0.3</product> <product>neutron:8.0.0</product> <product>neutron:8.1.0</product> </cve> <cve id="CVE-2016-5363" level="LOW"> <product>neutron:7.0.0</product> <product>neutron:7.0.1</product> <product>neutron:7.0.2</product> <product>neutron:7.0.3</product> <product>neutron:7.0.4</product> <product>neutron:8.0.0</product> <product>neutron:8.1.0</product> </cve> <cve id="CVE-2016-5368" level="LOW"> <product>ar3200_firmware:v200r005c20</product> <product>ar3200_firmware:v200r005c32</product> <product>ar3200_firmware:v200r007c00</product> </cve> <cve id="CVE-2016-9097" level="LOW"> <product>advanced_secure_gateway:6.6</product> <product>advanced_secure_gateway:6.6.3</product> <product>advanced_secure_gateway:6.6.4</product> <product>advanced_secure_gateway:6.6.4.3</product> <product>advanced_secure_gateway:6.6.5.1</product> <product>proxysg:6.5</product> <product>proxysg:6.5.1</product> <product>proxysg:6.5.2</product> <product>proxysg:6.5.2.10</product> <product>proxysg:6.5.4.1</product> <product>proxysg:6.5.5.7</product> <product>proxysg:6.5.6.1</product> <product>proxysg:6.5.7.6</product> <product>proxysg:6.5.9.2</product> <product>proxysg:6.5.9.8</product> <product>proxysg:6.5.9.10</product> <product>proxysg:6.5.9.14</product> <product>proxysg:6.6</product> <product>proxysg:6.6.2</product> <product>proxysg:6.6.2.1</product> <product>proxysg:6.6.2.2</product> <product>proxysg:6.6.3</product> <product>proxysg:6.6.3.2</product> <product>proxysg:6.6.4</product> <product>proxysg:6.6.4.1</product> <product>proxysg:6.6.4.3</product> <product>proxysg:6.6.5</product> <product>proxysg:6.7</product> <product>proxysg:6.7.1.1</product> </cve> <cve id="CVE-2016-9094" level="MEDIUM"> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:14.0</product> </cve> <cve id="CVE-2016-9092" level="MEDIUM"> <product>content_analysis:1.3</product> <product>content_analysis:2.1</product> <product>mail_threat_defense:1.1</product> </cve> <cve id="CVE-2016-9093" level="MEDIUM"> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> </cve> <cve id="CVE-2016-9091" level="LOW"> <product>advanced_secure_gateway:6.6.5.2</product> <product>content_analysis_system_software:1.3.7.3</product> </cve> <cve id="CVE-2016-9099" level="MEDIUM"> <product>advanced_secure_gateway:6.6</product> <product>proxysg:6.6</product> </cve> <cve id="CVE-2016-0859" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0858" level="MEDIUM"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-3003" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-0851" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0853" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0852" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0855" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0854" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0857" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-0856" level="LOW"> <product>webaccess:8.0</product> </cve> <cve id="CVE-2016-3002" level="LOW"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> </cve> <cve id="CVE-2016-5760" level="MEDIUM"> <product>groupwise:2014</product> <product>groupwise:2014_r2</product> </cve> <cve id="CVE-2016-5761" level="MEDIUM"> <product>groupwise:2014</product> <product>groupwise:2014_r2</product> </cve> <cve id="CVE-2016-3007" level="MEDIUM"> <product>connections:4.0.0.0</product> <product>connections:4.5.0.0</product> <product>connections:5.0.0.0</product> <product>connections:5.5.0.0</product> </cve> <cve id="CVE-2016-5762" level="LOW"> <product>groupwise:2014</product> <product>groupwise:2014_r2</product> </cve> <cve id="CVE-2016-5947" level="MEDIUM"> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.10.1</product> <product>tivoli_storage_productivity_center:5.2.0</product> <product>tivoli_storage_productivity_center:5.2.1</product> <product>tivoli_storage_productivity_center:5.2.1.1</product> <product>tivoli_storage_productivity_center:5.2.2</product> <product>tivoli_storage_productivity_center:5.2.3</product> <product>tivoli_storage_productivity_center:5.2.4</product> <product>tivoli_storage_productivity_center:5.2.4.1</product> <product>tivoli_storage_productivity_center:5.2.5</product> <product>tivoli_storage_productivity_center:5.2.5.1</product> <product>tivoli_storage_productivity_center:5.2.6</product> <product>tivoli_storage_productivity_center:5.2.7</product> <product>tivoli_storage_productivity_center:5.2.7.1</product> </cve> <cve id="CVE-2016-8879" level="MEDIUM"> <product>phantompdf:8.0.5</product> <product>reader:8.0.5</product> </cve> <cve id="CVE-2016-8878" level="MEDIUM"> <product>phantompdf:8.0.5</product> <product>reader:8.0.5</product> </cve> <cve id="CVE-2016-8877" level="MEDIUM"> <product>phantompdf:8.0.5</product> <product>reader:8.0.5</product> </cve> <cve id="CVE-2016-5764" level="MEDIUM"> <product>rumba_ftp:4.0</product> <product>rumba_ftp:4.1</product> <product>rumba_ftp:4.2</product> <product>rumba_ftp:4.3</product> <product>rumba_ftp:4.4</product> <product>rumba_ftp:4.5</product> </cve> <cve id="CVE-2016-8875" level="MEDIUM"> <product>phantompdf:8.0.5</product> <product>reader:8.0.5</product> </cve> <cve id="CVE-2016-8871" level="LOW"> <product>botan:1.11.29</product> <product>botan:1.11.30</product> <product>botan:1.11.31</product> <product>botan:1.11.32</product> </cve> <cve id="CVE-2016-5765" level="MEDIUM"> <product>host_access_management_and_security_server:12.2</product> <product>host_access_management_and_security_server:12.3</product> <product>reflection_for_the_web:12.1</product> <product>reflection_for_the_web:12.2</product> <product>reflection_for_the_web:12.3</product> <product>reflection_security_gateway:12.1</product> <product>reflection_zfe:1.4.0.14</product> <product>reflection_zfe:2.0.0.52</product> <product>reflection_zfe:2.0.1.18</product> </cve> <cve id="CVE-2016-5943" level="LOW"> <product>spectrum_control:5.2.0</product> <product>spectrum_control:5.2.1</product> <product>spectrum_control:5.2.1.1</product> <product>spectrum_control:5.2.2</product> <product>spectrum_control:5.2.3</product> <product>spectrum_control:5.2.4</product> <product>spectrum_control:5.2.4.1</product> <product>spectrum_control:5.2.5</product> <product>spectrum_control:5.2.5.1</product> <product>spectrum_control:5.2.6</product> <product>spectrum_control:5.2.7</product> <product>spectrum_control:5.2.7.1</product> <product>spectrum_control:5.2.8</product> <product>spectrum_control:5.2.9</product> <product>spectrum_control:5.2.10</product> <product>spectrum_control:5.2.10.1</product> </cve> <cve id="CVE-2016-6044" level="LOW"> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.1</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.1</product> <product>tivoli_storage_manager:6.4.2.2</product> <product>tivoli_storage_manager:6.4.2.3</product> <product>tivoli_storage_manager:6.4.2.4</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-6517" level="LOW"> <product>liferay:5.1.0</product> </cve> <cve id="CVE-2016-3034" level="LOW"> <product>security_appscan_source:9.0.1</product> <product>security_appscan_source:9.0.2</product> <product>security_appscan_source:9.0.3</product> </cve> <cve id="CVE-2016-6047" level="MEDIUM"> <product>jazz_reporting_service:6.0.2</product> </cve> <cve id="CVE-2016-6040" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> </cve> <cve id="CVE-2016-3033" level="LOW"> <product>appscan_source:8.7</product> <product>appscan_source:8.7.0.1</product> <product>appscan_source:8.8</product> <product>appscan_source:9.0</product> <product>appscan_source:9.0.0.1</product> <product>appscan_source:9.0.1</product> <product>appscan_source:9.0.2</product> <product>appscan_source:9.0.3</product> <product>appscan_source:9.0.3.1</product> <product>appscan_source:9.0.3.2</product> <product>appscan_source:9.0.3.3</product> </cve> <cve id="CVE-2016-6042" level="MEDIUM"> <product>security_appscan:9.0.0.0</product> <product>security_appscan:9.0.0.1</product> <product>security_appscan:9.0.1.0</product> <product>security_appscan:9.0.1.1</product> <product>security_appscan:9.0.2.0</product> <product>security_appscan:9.0.2.1</product> <product>security_appscan:9.0.3.0</product> <product>security_appscan:9.0.3.1</product> </cve> <cve id="CVE-2016-6043" level="MEDIUM"> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.1</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.1</product> <product>tivoli_storage_manager:6.4.2.2</product> <product>tivoli_storage_manager:6.4.2.3</product> <product>tivoli_storage_manager:6.4.2.4</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.7</product> </cve> <cve id="CVE-2016-6518" level="LOW"> <product>s12700_firmware:v200r005c00</product> <product>s12700_firmware:v200r006c00</product> <product>s12700_firmware:v200r008c00</product> <product>s5300_firmware:v200r001c00</product> <product>s5300_firmware:v200r002c00</product> <product>s5300_firmware:v200r003c00</product> <product>s5300_firmware:v200r005c00</product> <product>s5300_firmware:v200r005c01</product> <product>s5300_firmware:v200r005c02</product> <product>s5300_firmware:v200r006c00</product> <product>s5300_firmware:v200r007c00</product> <product>s5300_firmware:v200r008c00</product> <product>s5700_firmware:v200r001c00</product> <product>s5700_firmware:v200r001c01</product> <product>s5700_firmware:v200r002c00</product> <product>s5700_firmware:v200r003c00</product> <product>s5700_firmware:v200r003c02</product> <product>s5700_firmware:v200r005c00</product> <product>s5700_firmware:v200r006c00</product> <product>s5700_firmware:v200r008c00</product> <product>s6300_firmware:v200r001c00</product> <product>s6300_firmware:v200r002c00</product> <product>s6300_firmware:v200r003c00</product> <product>s6300_firmware:v200r005c00</product> <product>s6300_firmware:v200r005c01</product> <product>s6300_firmware:v200r005c02</product> <product>s6300_firmware:v200r008c00</product> <product>s6700_firmware:v200r001c00</product> <product>s6700_firmware:v200r001c01</product> <product>s6700_firmware:v200r002c00</product> <product>s6700_firmware:v200r003c00</product> <product>s6700_firmware:v200r008c00</product> <product>s7700_firmware:v200r001c00</product> <product>s7700_firmware:v200r002c00</product> <product>s7700_firmware:v200r003c00</product> <product>s7700_firmware:v200r005c00</product> <product>s7700_firmware:v200r006c00</product> <product>s7700_firmware:v200r008c00</product> <product>s9300_firmware:v200r001c00</product> <product>s9300_firmware:v200r003c00</product> <product>s9300_firmware:v200r005c00</product> <product>s9300_firmware:v200r006c00</product> <product>s9300_firmware:v200r008c00</product> <product>s9700_firmware:v200r001c00</product> <product>s9700_firmware:v200r001c01</product> <product>s9700_firmware:v200r002c00</product> <product>s9700_firmware:v200r003c00</product> <product>s9700_firmware:v200r005c00</product> <product>s9700_firmware:v200r006c00</product> <product>s9700_firmware:v200r008c00</product> </cve> <cve id="CVE-2016-6519" level="MEDIUM"> <product>manila:2.5</product> <product>openstack:7.0</product> <product>openstack:8.0</product> <product>openstack:9.0</product> </cve> <cve id="CVE-2016-8910" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8911" level="MEDIUM"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-8912" level="LOW"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-8913" level="LOW"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-8915" level="LOW"> <product>websphere_mq:8.0</product> <product>websphere_mq:8.0.0.0</product> <product>websphere_mq:8.0.0.1</product> <product>websphere_mq:8.0.0.2</product> <product>websphere_mq:8.0.0.3</product> <product>websphere_mq:8.0.0.4</product> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-8916" level="LOW"> <product>tivoli_storage_manager:6.3</product> <product>tivoli_storage_manager:6.4.0.0</product> <product>tivoli_storage_manager:6.4.1</product> <product>tivoli_storage_manager:6.4.1.0</product> <product>tivoli_storage_manager:6.4.2</product> <product>tivoli_storage_manager:6.4.2.100</product> <product>tivoli_storage_manager:6.4.2.200</product> <product>tivoli_storage_manager:6.4.2.500</product> <product>tivoli_storage_manager:6.4.2.600</product> <product>tivoli_storage_manager:6.4.3</product> <product>tivoli_storage_manager:6.4.3.1</product> <product>tivoli_storage_manager:7.1</product> <product>tivoli_storage_manager:7.1..5.100</product> <product>tivoli_storage_manager:7.1.0.1</product> <product>tivoli_storage_manager:7.1.0.2</product> <product>tivoli_storage_manager:7.1.0.3</product> <product>tivoli_storage_manager:7.1.1</product> <product>tivoli_storage_manager:7.1.1.1</product> <product>tivoli_storage_manager:7.1.1.2</product> <product>tivoli_storage_manager:7.1.1.100</product> <product>tivoli_storage_manager:7.1.1.200</product> <product>tivoli_storage_manager:7.1.1.300</product> <product>tivoli_storage_manager:7.1.3</product> <product>tivoli_storage_manager:7.1.3.000</product> <product>tivoli_storage_manager:7.1.3.1</product> <product>tivoli_storage_manager:7.1.3.2</product> <product>tivoli_storage_manager:7.1.3.100</product> <product>tivoli_storage_manager:7.1.4</product> <product>tivoli_storage_manager:7.1.4.1</product> <product>tivoli_storage_manager:7.1.4.2</product> <product>tivoli_storage_manager:7.1.5</product> <product>tivoli_storage_manager:7.1.5.200</product> <product>tivoli_storage_manager:7.1.6</product> <product>tivoli_storage_manager:7.1.6.2</product> <product>tivoli_storage_manager:7.1.6.3</product> <product>tivoli_storage_manager:7.1.6.4</product> </cve> <cve id="CVE-2016-8917" level="MEDIUM"> <product>sterling_selling_and_fulfillment_foundation:9.2.0</product> <product>sterling_selling_and_fulfillment_foundation:9.2.1</product> <product>sterling_selling_and_fulfillment_foundation:9.3.0</product> <product>sterling_selling_and_fulfillment_foundation:9.4.0</product> <product>sterling_selling_and_fulfillment_foundation:9.5.0</product> </cve> <cve id="CVE-2016-8918" level="MEDIUM"> <product>integration_bus:10.0</product> </cve> <cve id="CVE-2016-8919" level="LOW"> <product>websphere_application_server:7.0</product> <product>websphere_application_server:8.0</product> <product>websphere_application_server:8.5.5</product> <product>websphere_application_server:9.0</product> </cve> <cve id="CVE-2016-1896" level="LOW"> <product>printer_firmware:atl.02.048</product> <product>printer_firmware:cb.02.048</product> <product>printer_firmware:pp.02.048</product> <product>printer_firmware:yk.02.048</product> </cve> <cve id="CVE-2016-1894" level="MEDIUM"> <product>oncommand_workflow_automation:3.1</product> </cve> <cve id="CVE-2016-1895" level="LOW"> <product>data_ontap:8.2.4</product> <product>data_ontap:8.3.2p12</product> <product>data_ontap:9.0</product> </cve> <cve id="CVE-2016-1899" level="MEDIUM"> <product>cgit:0.11.2</product> <product>fedora:22</product> </cve> <cve id="CVE-2016-0507" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-3983" level="LOW"> <product>advanced_threat_defense:3.4.4.142</product> </cve> <cve id="CVE-2016-3980" level="LOW"> <product>java_as:7.4</product> </cve> <cve id="CVE-2016-3986" level="MEDIUM"> <product>avast:-</product> </cve> <cve id="CVE-2016-3987" level="LOW"> <product>password_manager:-</product> </cve> <cve id="CVE-2016-0213" level="LOW"> <product>tivoli_storage_manager_fastback:5.5.0</product> <product>tivoli_storage_manager_fastback:6.1.0</product> <product>tivoli_storage_manager_fastback:6.1.0.0</product> <product>tivoli_storage_manager_fastback:6.1.0.1</product> <product>tivoli_storage_manager_fastback:6.1.1</product> <product>tivoli_storage_manager_fastback:6.1.1.0</product> <product>tivoli_storage_manager_fastback:6.1.2</product> <product>tivoli_storage_manager_fastback:6.1.2.0</product> <product>tivoli_storage_manager_fastback:6.1.3</product> <product>tivoli_storage_manager_fastback:6.1.3.0</product> <product>tivoli_storage_manager_fastback:6.1.4</product> <product>tivoli_storage_manager_fastback:6.1.4.0</product> <product>tivoli_storage_manager_fastback:6.1.5</product> <product>tivoli_storage_manager_fastback:6.1.5.0</product> <product>tivoli_storage_manager_fastback:6.1.5.2</product> <product>tivoli_storage_manager_fastback:6.1.6</product> <product>tivoli_storage_manager_fastback:6.1.6.0</product> <product>tivoli_storage_manager_fastback:6.1.6.1</product> <product>tivoli_storage_manager_fastback:6.1.6.2</product> <product>tivoli_storage_manager_fastback:6.1.7</product> <product>tivoli_storage_manager_fastback:6.1.7.0</product> <product>tivoli_storage_manager_fastback:6.1.7.1</product> <product>tivoli_storage_manager_fastback:6.1.7.2</product> <product>tivoli_storage_manager_fastback:6.1.8</product> <product>tivoli_storage_manager_fastback:6.1.8.0</product> <product>tivoli_storage_manager_fastback:6.1.8.1</product> <product>tivoli_storage_manager_fastback:6.1.9</product> <product>tivoli_storage_manager_fastback:6.1.9.0</product> <product>tivoli_storage_manager_fastback:6.1.9.1</product> <product>tivoli_storage_manager_fastback:6.1.10</product> <product>tivoli_storage_manager_fastback:6.1.10.0</product> <product>tivoli_storage_manager_fastback:6.1.10.1</product> <product>tivoli_storage_manager_fastback:6.1.11</product> <product>tivoli_storage_manager_fastback:6.1.11.0</product> <product>tivoli_storage_manager_fastback:6.1.11.1</product> </cve> <cve id="CVE-2016-7932" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0211" level="LOW"> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.1</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.2</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.3</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.4</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.5</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.6</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.7</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.8</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.9</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.10</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.7.0.11</product> <product>db2:9.8</product> <product>db2:9.8</product> <product>db2:9.8</product> <product>db2:9.8</product> <product>db2:9.8</product> <product>db2:9.8</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.1</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.2</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.3</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.4</product> <product>db2:9.8.0.5</product> <product>db2:9.8.0.5</product> <product>db2:9.8.0.5</product> <product>db2:9.8.0.5</product> <product>db2:9.8.0.5</product> <product>db2:9.8.0.5</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.1</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.2</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.3</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.4</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.1.0.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.1</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.2</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.3</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.4</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.5</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.6</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2:10.5.0.7</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.1</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.2</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.3</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.4</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.5</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.6</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.7</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.8</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.9</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.10</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:9.7.0.11</product> <product>db2_connect:9.8</product> <product>db2_connect:9.8</product> <product>db2_connect:9.8</product> <product>db2_connect:9.8.0.1</product> <product>db2_connect:9.8.0.1</product> <product>db2_connect:9.8.0.1</product> <product>db2_connect:9.8.0.2</product> <product>db2_connect:9.8.0.2</product> <product>db2_connect:9.8.0.2</product> <product>db2_connect:9.8.0.3</product> <product>db2_connect:9.8.0.3</product> <product>db2_connect:9.8.0.3</product> <product>db2_connect:9.8.0.4</product> <product>db2_connect:9.8.0.4</product> <product>db2_connect:9.8.0.4</product> <product>db2_connect:9.8.0.5</product> <product>db2_connect:9.8.0.5</product> <product>db2_connect:9.8.0.5</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.1</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.2</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.3</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.4</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.1.0.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.1</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.2</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.3</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.4</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.5</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.6</product> <product>db2_connect:10.5.0.7</product> <product>db2_connect:10.5.0.7</product> <product>db2_connect:10.5.0.7</product> </cve> <cve id="CVE-2016-0210" level="LOW"> <product>sterling_b2b_integrator:5.1</product> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-7937" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0216" level="LOW"> <product>tivoli_storage_manager_fastback:5.5.0</product> <product>tivoli_storage_manager_fastback:6.1.0</product> <product>tivoli_storage_manager_fastback:6.1.0.1</product> <product>tivoli_storage_manager_fastback:6.1.1</product> <product>tivoli_storage_manager_fastback:6.1.1.0</product> <product>tivoli_storage_manager_fastback:6.1.2</product> <product>tivoli_storage_manager_fastback:6.1.2.0</product> <product>tivoli_storage_manager_fastback:6.1.3</product> <product>tivoli_storage_manager_fastback:6.1.3.0</product> <product>tivoli_storage_manager_fastback:6.1.4</product> <product>tivoli_storage_manager_fastback:6.1.4.0</product> <product>tivoli_storage_manager_fastback:6.1.5</product> <product>tivoli_storage_manager_fastback:6.1.5.0</product> <product>tivoli_storage_manager_fastback:6.1.5.2</product> <product>tivoli_storage_manager_fastback:6.1.6</product> <product>tivoli_storage_manager_fastback:6.1.6.0</product> <product>tivoli_storage_manager_fastback:6.1.6.1</product> <product>tivoli_storage_manager_fastback:6.1.6.2</product> <product>tivoli_storage_manager_fastback:6.1.7</product> <product>tivoli_storage_manager_fastback:6.1.7.0</product> <product>tivoli_storage_manager_fastback:6.1.7.1</product> <product>tivoli_storage_manager_fastback:6.1.7.2</product> <product>tivoli_storage_manager_fastback:6.1.8</product> <product>tivoli_storage_manager_fastback:6.1.8.0</product> <product>tivoli_storage_manager_fastback:6.1.9</product> <product>tivoli_storage_manager_fastback:6.1.9.0</product> <product>tivoli_storage_manager_fastback:6.1.9.1</product> <product>tivoli_storage_manager_fastback:6.1.10</product> <product>tivoli_storage_manager_fastback:6.1.10.0</product> <product>tivoli_storage_manager_fastback:6.1.10.1</product> <product>tivoli_storage_manager_fastback:6.1.11</product> <product>tivoli_storage_manager_fastback:6.1.11.0</product> <product>tivoli_storage_manager_fastback:6.1.11.1</product> </cve> <cve id="CVE-2016-0215" level="LOW"> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.7</product> <product>db2:9.8</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.1</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> <product>db2:10.5</product> </cve> <cve id="CVE-2016-7934" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-0219" level="LOW"> <product>rational_collaborative_lifecycle_management:3.0.1</product> <product>rational_collaborative_lifecycle_management:3.0.1.1</product> <product>rational_collaborative_lifecycle_management:3.0.1.2</product> <product>rational_collaborative_lifecycle_management:3.0.1.3</product> <product>rational_collaborative_lifecycle_management:3.0.1.4</product> <product>rational_collaborative_lifecycle_management:3.0.1.5</product> <product>rational_collaborative_lifecycle_management:3.0.1.6</product> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_doors_next_generation:4.0</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_quality_manager:3.0</product> <product>rational_quality_manager:3.0.1</product> <product>rational_quality_manager:3.0.1.1</product> <product>rational_quality_manager:3.0.1.2</product> <product>rational_quality_manager:3.0.1.3</product> <product>rational_quality_manager:3.0.1.4</product> <product>rational_quality_manager:3.0.1.5</product> <product>rational_quality_manager:3.0.1.6</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_requirements_composer:3.0</product> <product>rational_requirements_composer:3.0.1</product> <product>rational_requirements_composer:3.0.1.1</product> <product>rational_requirements_composer:3.0.1.2</product> <product>rational_requirements_composer:3.0.1.3</product> <product>rational_requirements_composer:3.0.1.4</product> <product>rational_requirements_composer:3.0.1.5</product> <product>rational_requirements_composer:3.0.1.6</product> <product>rational_requirements_composer:4.0</product> <product>rational_requirements_composer:4.0.1</product> <product>rational_requirements_composer:4.0.2</product> <product>rational_requirements_composer:4.0.3</product> <product>rational_requirements_composer:4.0.4</product> <product>rational_requirements_composer:4.0.5</product> <product>rational_requirements_composer:4.0.6</product> <product>rational_requirements_composer:4.0.7</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_team_concert:3.0</product> <product>rational_team_concert:3.0.1</product> <product>rational_team_concert:3.0.1.1</product> <product>rational_team_concert:3.0.1.2</product> <product>rational_team_concert:3.0.1.3</product> <product>rational_team_concert:3.0.1.4</product> <product>rational_team_concert:3.0.1.5</product> <product>rational_team_concert:3.0.1.6</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> </cve> <cve id="CVE-2016-7938" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-4910" level="LOW"> <product>garoon:3.0.0</product> <product>garoon:3.0.1</product> <product>garoon:3.0.2</product> <product>garoon:3.0.3</product> <product>garoon:3.1.0</product> <product>garoon:3.1.1</product> <product>garoon:3.1.2</product> <product>garoon:3.1.3</product> <product>garoon:3.5.0</product> <product>garoon:3.5.1</product> <product>garoon:3.5.2</product> <product>garoon:3.5.3</product> <product>garoon:3.5.4</product> <product>garoon:3.5.5</product> <product>garoon:3.7.0</product> <product>garoon:3.7.1</product> <product>garoon:3.7.2</product> <product>garoon:3.7.3</product> <product>garoon:3.7.4</product> <product>garoon:3.7.5</product> <product>garoon:4.0.0</product> <product>garoon:4.0.1</product> <product>garoon:4.0.2</product> <product>garoon:4.0.3</product> <product>garoon:4.2.0</product> <product>garoon:4.2.1</product> <product>garoon:4.2.2</product> </cve> <cve id="CVE-2016-4911" level="LOW"> <product>openstack_identity:9.0.0.0</product> <product>openstack_identity:9.0.0.0</product> <product>openstack_identity:9.0.0.0</product> </cve> <cve id="CVE-2016-4912" level="LOW"> <product>openslp:2.0.0</product> </cve> <cve id="CVE-2016-0077" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0072" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0071" level="MEDIUM"> <product>internet_explorer:9</product> </cve> <cve id="CVE-2016-9799" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9798" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9795" level="LOW"> <product>client_automation:12.8</product> <product>client_automation:12.9</product> <product>client_automation:14.0</product> <product>systemedge:5.8.2</product> <product>systemedge:5.9</product> <product>systems_performance_for_infrastructure_managers:12.8</product> <product>systems_performance_for_infrastructure_managers:12.9</product> <product>universal_job_management_agent:11.2</product> <product>virtual_assurance_for_infrastructure_managers:12.8</product> <product>virtual_assurance_for_infrastructure_managers:12.9</product> <product>workload_automation_ae:11.0</product> <product>workload_automation_ae:11.3</product> <product>workload_automation_ae:11.3.5</product> <product>workload_automation_ae:11.3.6</product> </cve> <cve id="CVE-2016-9797" level="LOW"> <product>bluez:5.42</product> </cve> <cve id="CVE-2016-9796" level="LOW"> <product>omnivista_8770_network_management_system:2.0</product> <product>omnivista_8770_network_management_system:2.6</product> <product>omnivista_8770_network_management_system:3.0</product> </cve> <cve id="CVE-2016-10048" level="LOW"> <product>imagemagick:6.9.4-7</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-10049" level="MEDIUM"> <product>imagemagick:6.9.4-3</product> </cve> <cve id="CVE-2016-10514" level="MEDIUM"> <product>piwigo:2.8.2</product> </cve> <cve id="CVE-2016-10515" level="MEDIUM"> <product>redmine:3.2.2</product> </cve> <cve id="CVE-2016-10516" level="MEDIUM"> <product>werkzeug:0.1</product> <product>werkzeug:0.2</product> <product>werkzeug:0.3</product> <product>werkzeug:0.3.1</product> <product>werkzeug:0.4</product> <product>werkzeug:0.4.1</product> <product>werkzeug:0.5</product> <product>werkzeug:0.5.1</product> <product>werkzeug:0.6</product> <product>werkzeug:0.6.1</product> <product>werkzeug:0.6.2</product> <product>werkzeug:0.7</product> <product>werkzeug:0.7.1</product> <product>werkzeug:0.7.2</product> <product>werkzeug:0.8</product> <product>werkzeug:0.8.2</product> <product>werkzeug:0.8.3</product> <product>werkzeug:0.9</product> <product>werkzeug:0.9.1</product> <product>werkzeug:0.9.2</product> <product>werkzeug:0.9.3</product> <product>werkzeug:0.9.4</product> <product>werkzeug:0.9.5</product> <product>werkzeug:0.9.6</product> <product>werkzeug:0.10</product> <product>werkzeug:0.10.1</product> <product>werkzeug:0.10.2</product> <product>werkzeug:0.10.3</product> <product>werkzeug:0.10.4</product> <product>werkzeug:0.11</product> <product>werkzeug:0.11.1</product> <product>werkzeug:0.11.2</product> <product>werkzeug:0.11.3</product> <product>werkzeug:0.11.4</product> <product>werkzeug:0.11.5</product> <product>werkzeug:0.11.6</product> <product>werkzeug:0.11.7</product> <product>werkzeug:0.11.8</product> <product>werkzeug:0.11.9</product> <product>werkzeug:0.11.10</product> </cve> <cve id="CVE-2016-10517" level="MEDIUM"> <product>redis:1.3.6</product> <product>redis:1.3.7</product> <product>redis:1.3.8</product> <product>redis:1.3.9</product> <product>redis:1.3.10</product> <product>redis:1.3.11</product> <product>redis:1.3.12</product> <product>redis:2.0.0</product> <product>redis:2.0.0</product> <product>redis:2.0.0</product> <product>redis:2.0.0</product> <product>redis:2.0.0</product> <product>redis:2.0.0</product> <product>redis:2.0.1</product> <product>redis:2.0.2</product> <product>redis:2.0.3</product> <product>redis:2.0.4</product> <product>redis:2.0.5</product> <product>redis:2.1.1</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2</product> <product>redis:2.2.0</product> <product>redis:2.2.0</product> <product>redis:2.2.0</product> <product>redis:2.2.0</product> <product>redis:2.2.0</product> <product>redis:2.2.2</product> <product>redis:2.2.3</product> <product>redis:2.2.4</product> <product>redis:2.2.5</product> <product>redis:2.2.6</product> <product>redis:2.2.7</product> <product>redis:2.2.8</product> <product>redis:2.2.9</product> <product>redis:2.2.10</product> <product>redis:2.2.11</product> <product>redis:2.2.12</product> <product>redis:2.2.13</product> <product>redis:2.2.14</product> <product>redis:2.2.15</product> <product>redis:2.2.105</product> <product>redis:2.2.106</product> <product>redis:2.2.107</product> <product>redis:2.2.110</product> <product>redis:2.2.111</product> <product>redis:2.3</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.0</product> <product>redis:2.4.1</product> <product>redis:2.4.2</product> <product>redis:2.4.3</product> <product>redis:2.4.4</product> <product>redis:2.4.5</product> <product>redis:2.4.6</product> <product>redis:2.4.7</product> <product>redis:2.4.8</product> <product>redis:2.4.9</product> <product>redis:2.4.10</product> <product>redis:2.4.11</product> <product>redis:2.4.12</product> <product>redis:2.4.13</product> <product>redis:2.4.14</product> <product>redis:2.4.15</product> <product>redis:2.4.16</product> <product>redis:2.4.17</product> <product>redis:2.4.18</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.0</product> <product>redis:2.6.1</product> <product>redis:2.6.2</product> <product>redis:2.6.3</product> <product>redis:2.6.4</product> <product>redis:2.6.5</product> <product>redis:2.6.6</product> <product>redis:2.6.7</product> <product>redis:2.6.7-1</product> <product>redis:2.6.8</product> <product>redis:2.6.8-1</product> <product>redis:2.6.9</product> <product>redis:2.6.9-1</product> <product>redis:2.6.10</product> <product>redis:2.6.10-1</product> <product>redis:2.6.10-2</product> <product>redis:2.6.10-3</product> <product>redis:2.6.11</product> <product>redis:2.6.12</product> <product>redis:2.6.13</product> <product>redis:2.6.14</product> <product>redis:2.6.14-1</product> <product>redis:2.6.14-2</product> <product>redis:2.6.15</product> <product>redis:2.6.16</product> <product>redis:2.6.17</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.0</product> <product>redis:2.8.1</product> <product>redis:2.8.2</product> <product>redis:2.8.3</product> <product>redis:2.8.4</product> <product>redis:2.8.5</product> <product>redis:2.8.6</product> <product>redis:2.8.7</product> <product>redis:2.8.8</product> <product>redis:2.8.9</product> <product>redis:2.8.10</product> <product>redis:2.8.11</product> <product>redis:2.8.12</product> <product>redis:2.8.13</product> <product>redis:2.8.14</product> <product>redis:2.8.15</product> <product>redis:2.8.16</product> <product>redis:2.8.17</product> <product>redis:2.8.18</product> <product>redis:2.8.19</product> <product>redis:2.8.20</product> <product>redis:2.8.21</product> <product>redis:2.8.22</product> <product>redis:2.8.23</product> <product>redis:2.8.24</product> <product>redis:3.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.0</product> <product>redis:3.0.1</product> <product>redis:3.0.2</product> <product>redis:3.0.3</product> <product>redis:3.0.4</product> <product>redis:3.0.5</product> <product>redis:3.0.6</product> <product>redis:3.0.7</product> <product>redis:3.2</product> <product>redis:3.2.0</product> <product>redis:3.2.0</product> <product>redis:3.2.0</product> <product>redis:3.2.1</product> <product>redis:3.2.2</product> <product>redis:3.2.3</product> <product>redis:3.2.4</product> <product>redis:3.2.5</product> <product>redis:3.2.6</product> </cve> <cve id="CVE-2016-10046" level="MEDIUM"> <product>imagemagick:6.9.5-4</product> </cve> <cve id="CVE-2016-10511" level="MEDIUM"> <product>twitter:6.62</product> <product>twitter:6.62.1</product> </cve> <cve id="CVE-2016-10512" level="LOW"> <product>faxfinder:-</product> </cve> <cve id="CVE-2016-10513" level="MEDIUM"> <product>piwigo:2.8.2</product> </cve> <cve id="CVE-2016-9139" level="MEDIUM"> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.0</product> <product>otrs:3.0.1</product> <product>otrs:3.0.2</product> <product>otrs:3.0.3</product> <product>otrs:3.0.4</product> <product>otrs:3.0.5</product> <product>otrs:3.0.6</product> <product>otrs:3.0.7</product> <product>otrs:3.0.8</product> <product>otrs:3.0.9</product> <product>otrs:3.0.10</product> <product>otrs:3.0.11</product> <product>otrs:3.0.12</product> <product>otrs:3.0.13</product> <product>otrs:3.0.14</product> <product>otrs:3.0.15</product> <product>otrs:3.0.16</product> <product>otrs:3.0.17</product> <product>otrs:3.1.0</product> <product>otrs:3.1.1</product> <product>otrs:3.1.2</product> <product>otrs:3.1.3</product> <product>otrs:3.1.4</product> <product>otrs:3.1.5</product> <product>otrs:3.1.6</product> <product>otrs:3.1.7</product> <product>otrs:3.1.8</product> <product>otrs:3.1.9</product> <product>otrs:3.1.10</product> <product>otrs:3.1.11</product> <product>otrs:3.1.13</product> <product>otrs:3.1.14</product> <product>otrs:3.1.15</product> <product>otrs:3.1.16</product> <product>otrs:3.1.17</product> <product>otrs:3.1.18</product> <product>otrs:3.1.19</product> <product>otrs:3.1.20</product> <product>otrs:3.1.21</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.0</product> <product>otrs:3.2.1</product> <product>otrs:3.2.2</product> <product>otrs:3.2.3</product> <product>otrs:3.2.4</product> <product>otrs:3.2.5</product> <product>otrs:3.2.6</product> <product>otrs:3.2.7</product> <product>otrs:3.2.8</product> <product>otrs:3.2.9</product> <product>otrs:3.2.10</product> <product>otrs:3.2.11</product> <product>otrs:3.2.12</product> <product>otrs:3.2.13</product> <product>otrs:3.2.14</product> <product>otrs:3.2.15</product> <product>otrs:3.2.16</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.0</product> <product>otrs:3.3.1</product> <product>otrs:3.3.2</product> <product>otrs:3.3.3</product> <product>otrs:3.3.4</product> <product>otrs:3.3.5</product> <product>otrs:3.3.6</product> <product>otrs:3.3.7</product> <product>otrs:3.3.8</product> <product>otrs:3.3.9</product> <product>otrs:3.3.10</product> <product>otrs:3.3.11</product> <product>otrs:3.3.12</product> <product>otrs:3.3.13</product> <product>otrs:3.3.14</product> <product>otrs:3.3.15</product> <product>otrs:4.0.0</product> <product>otrs:4.0.0</product> <product>otrs:4.0.0</product> <product>otrs:4.0.0</product> <product>otrs:4.0.0</product> <product>otrs:4.0.0</product> <product>otrs:4.0.1</product> <product>otrs:4.0.2</product> <product>otrs:4.0.3</product> <product>otrs:4.0.4</product> <product>otrs:4.0.5</product> <product>otrs:4.0.6</product> <product>otrs:4.0.7</product> <product>otrs:4.0.8</product> <product>otrs:4.0.9</product> <product>otrs:4.0.10</product> <product>otrs:4.0.11</product> <product>otrs:4.0.12</product> <product>otrs:4.0.13</product> <product>otrs:4.0.14</product> <product>otrs:4.0.15</product> <product>otrs:4.0.16</product> <product>otrs:4.0.17</product> <product>otrs:4.0.18</product> <product>otrs:5.0.0</product> <product>otrs:5.0.0</product> <product>otrs:5.0.0</product> <product>otrs:5.0.0</product> <product>otrs:5.0.0</product> <product>otrs:5.0.0</product> <product>otrs:5.0.1</product> <product>otrs:5.0.2</product> <product>otrs:5.0.3</product> <product>otrs:5.0.4</product> <product>otrs:5.0.5</product> <product>otrs:5.0.6</product> <product>otrs:5.0.7</product> <product>otrs:5.0.8</product> <product>otrs:5.0.9</product> <product>otrs:5.0.10</product> <product>otrs:5.0.11</product> <product>otrs:5.0.12</product> <product>otrs:5.0.13</product> </cve> <cve id="CVE-2016-9135" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-9134" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-9136" level="LOW"> <product>mujs:b6de34ac6d8bb7dd5461c57940acfbd3ee7fd93e</product> </cve> <cve id="CVE-2016-9131" level="LOW"> <product>bind:9.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.0</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.0.1</product> <product>bind:9.1</product> <product>bind:9.1.0</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.1</product> <product>bind:9.1.2</product> <product>bind:9.1.2</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.1.3</product> <product>bind:9.2</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.0</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.1</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.2</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.3</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.4</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.5</product> <product>bind:9.2.6</product> <product>bind:9.2.6</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.7</product> <product>bind:9.2.8</product> <product>bind:9.2.9</product> <product>bind:9.2.9</product> <product>bind:9.3</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.0</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.1</product> <product>bind:9.3.2</product> <product>bind:9.3.2</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.3</product> <product>bind:9.3.4</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.5</product> <product>bind:9.3.6</product> <product>bind:9.3.6</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.0</product> <product>bind:9.4.1</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.2</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.4.3</product> <product>bind:9.5</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.0</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.1</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.2</product> <product>bind:9.5.3</product> <product>bind:9.5.3</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.0</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.1</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.2</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.6.3</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.0</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.1</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.2</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.3</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.4</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.5</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.6</product> <product>bind:9.7.7</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.0</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.1</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.2</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.3</product> <product>bind:9.8.4</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.5</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.8.6</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.0</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.1</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> <product>bind:9.9.2</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.3</product> <product>bind:9.9.4</product> <product>bind:9.9.5</product> <product>bind:9.9.6</product> <product>bind:9.9.6</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.7</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.8</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.9.9</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.0</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.1</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.2</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.3</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.10.4</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> <product>bind:9.11.0</product> </cve> <cve id="CVE-2016-9130" level="MEDIUM"> <product>revive_adserver:3.2.2</product> </cve> <cve id="CVE-2016-9132" level="LOW"> <product>botan:1.8.0</product> <product>botan:1.8.1</product> <product>botan:1.8.2</product> <product>botan:1.8.3</product> <product>botan:1.8.4</product> <product>botan:1.8.5</product> <product>botan:1.8.6</product> <product>botan:1.8.7</product> <product>botan:1.8.8</product> <product>botan:1.8.9</product> <product>botan:1.8.10</product> <product>botan:1.8.11</product> <product>botan:1.8.12</product> <product>botan:1.8.13</product> <product>botan:1.8.14</product> <product>botan:1.8.15</product> <product>botan:1.9.0</product> <product>botan:1.9.1</product> <product>botan:1.9.2</product> <product>botan:1.9.3</product> <product>botan:1.9.4</product> <product>botan:1.9.5</product> <product>botan:1.9.6</product> <product>botan:1.9.7</product> <product>botan:1.9.8</product> <product>botan:1.9.9</product> <product>botan:1.9.10</product> <product>botan:1.9.11</product> <product>botan:1.9.12</product> <product>botan:1.9.13</product> <product>botan:1.9.14</product> <product>botan:1.9.15</product> <product>botan:1.9.16</product> <product>botan:1.9.17</product> <product>botan:1.9.18</product> <product>botan:1.10.0</product> <product>botan:1.10.1</product> <product>botan:1.10.2</product> <product>botan:1.10.3</product> <product>botan:1.10.4</product> <product>botan:1.10.5</product> <product>botan:1.10.6</product> <product>botan:1.10.7</product> <product>botan:1.10.8</product> <product>botan:1.10.9</product> <product>botan:1.10.10</product> <product>botan:1.10.11</product> <product>botan:1.10.12</product> <product>botan:1.10.13</product> <product>botan:1.10.14</product> <product>botan:1.10.15</product> <product>botan:1.11.0</product> <product>botan:1.11.1</product> <product>botan:1.11.2</product> <product>botan:1.11.3</product> <product>botan:1.11.4</product> <product>botan:1.11.5</product> <product>botan:1.11.6</product> <product>botan:1.11.7</product> <product>botan:1.11.8</product> <product>botan:1.11.9</product> <product>botan:1.11.10</product> <product>botan:1.11.11</product> <product>botan:1.11.12</product> <product>botan:1.11.13</product> <product>botan:1.11.14</product> <product>botan:1.11.15</product> <product>botan:1.11.16</product> <product>botan:1.11.17</product> <product>botan:1.11.18</product> <product>botan:1.11.19</product> <product>botan:1.11.20</product> <product>botan:1.11.21</product> <product>botan:1.11.23</product> <product>botan:1.11.24</product> <product>botan:1.11.25</product> <product>botan:1.11.26</product> <product>botan:1.11.27</product> <product>botan:1.11.28</product> <product>botan:1.11.29</product> <product>botan:1.11.30</product> <product>botan:1.11.31</product> <product>botan:1.11.32</product> <product>botan:1.11.33</product> </cve> <cve id="CVE-2016-1308" level="LOW"> <product>unified_communications_manager:10.5%5c%282.13900.9%5c%29</product> </cve> <cve id="CVE-2016-1309" level="MEDIUM"> <product>webex_meetings_server:2.5.1.5</product> </cve> <cve id="CVE-2016-1306" level="MEDIUM"> <product>fog_director:1.0%5c%280%5c%29</product> </cve> <cve id="CVE-2016-1307" level="LOW"> <product>finesse:10.5%5c%281%5c%29_base</product> <product>finesse:11.0%5c%281%5c%29_base</product> <product>unified_contact_center_express:10.6%5c%281%5c%29</product> </cve> <cve id="CVE-2016-1304" level="MEDIUM"> <product>unity_connection:10.5%282.3009%29</product> </cve> <cve id="CVE-2016-1305" level="MEDIUM"> <product>application_policy_infrastructure_controller_enterprise_module:1.1_base</product> </cve> <cve id="CVE-2016-1302" level="LOW"> <product>application_policy_infrastructure_controller:1.0%5c%281e%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%281h%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%281k%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%281n%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%282j%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%282m%5c%29</product> <product>application_policy_infrastructure_controller:1.0%5c%283f%5c%29</product> <product>application_policy_infrastructure_controller:1.1%5c%280.920a%5c%29</product> <product>nx-os:11.0%5c%281b%5c%29</product> <product>nx-os:11.0%5c%281c%5c%29</product> <product>nx-os:11.0%5c%281d%5c%29</product> <product>nx-os:11.0%5c%281e%5c%29</product> <product>nx-os:11.0%5c%282j%5c%29</product> <product>nx-os:11.0%5c%282m%5c%29</product> <product>nx-os:11.0%5c%283f%5c%29</product> <product>nx-os:base</product> </cve> <cve id="CVE-2016-1303" level="LOW"> <product>500_series_switch_firmware:1.2.0.92</product> </cve> <cve id="CVE-2016-1300" level="MEDIUM"> <product>unity_connection:10.5%282.3009%29</product> </cve> <cve id="CVE-2016-1301" level="MEDIUM"> <product>prime_security_manager:9.0.0</product> <product>prime_security_manager:9.0.1-40</product> <product>prime_security_manager:9.0.2-68</product> <product>prime_security_manager:9.1.0</product> <product>prime_security_manager:9.1.2-29</product> <product>prime_security_manager:9.1.2-42</product> <product>prime_security_manager:9.1.3-8</product> <product>prime_security_manager:9.1.3-10</product> <product>prime_security_manager:9.1.3-13</product> <product>prime_security_manager:9.2.0</product> <product>prime_security_manager:9.2.1-1</product> <product>prime_security_manager:9.2.1-2</product> <product>asa_cx_context-aware_security_software:9.0.1</product> <product>asa_cx_context-aware_security_software:9.0.1-40</product> <product>asa_cx_context-aware_security_software:9.0.2</product> <product>asa_cx_context-aware_security_software:9.0.2-68</product> <product>asa_cx_context-aware_security_software:9.0_base</product> <product>asa_cx_context-aware_security_software:9.1.2-29</product> <product>asa_cx_context-aware_security_software:9.1.2-42</product> <product>asa_cx_context-aware_security_software:9.1.3-8</product> <product>asa_cx_context-aware_security_software:9.1.3-10</product> <product>asa_cx_context-aware_security_software:9.1.3-13</product> <product>asa_cx_context-aware_security_software:9.2.1-1</product> <product>asa_cx_context-aware_security_software:9.2.1-2</product> <product>asa_cx_context-aware_security_software:9.2.1-3</product> <product>asa_cx_context-aware_security_software:9.2.1-4</product> </cve> <cve id="CVE-2016-1000009" level="LOW"> <product>tp-link:-</product> </cve> <cve id="CVE-2016-5799" level="LOW"> <product>oncell_g3001_firmware:1.6</product> <product>oncell_g3100v2_firmware:2.7</product> </cve> <cve id="CVE-2016-5798" level="LOW"> <product>automation_fv_designer:1.2.8.0</product> <product>automation_pm_designer:2.1.2.2</product> </cve> <cve id="CVE-2016-5795" level="LOW"> <product>i-vu:6.5</product> <product>sitescan_web:6.5</product> <product>webctrl:6.5</product> </cve> <cve id="CVE-2016-1000001" level="MEDIUM"> <product>flask-oidc:0.1.2</product> </cve> <cve id="CVE-2016-5797" level="LOW"> <product>lighthouse_sms:5.1</product> </cve> <cve id="CVE-2016-5796" level="MEDIUM"> <product>automation_fv_designer:1.2.8.0</product> <product>automation_pm_designer:2.1.2.2</product> </cve> <cve id="CVE-2016-5791" level="LOW"> <product>jtc-200_firmware</product> </cve> <cve id="CVE-2016-5790" level="LOW"> <product>lighthouse_sms:5.1</product> </cve> <cve id="CVE-2016-5793" level="LOW"> <product>active_opc_server:2.4.18</product> </cve> <cve id="CVE-2016-5792" level="LOW"> <product>softcms:1.4</product> </cve> <cve id="CVE-2016-4350" level="LOW"> <product>storage_resource_monitor:6.2.1</product> </cve> <cve id="CVE-2016-5429" level="MEDIUM"> <product>jose-php:2.2.0</product> </cve> <cve id="CVE-2016-5422" level="LOW"> <product>jboss_operations_network:3.3.6</product> </cve> <cve id="CVE-2016-5427" level="LOW"> <product>authoritative:3.4.9</product> </cve> <cve id="CVE-2016-5426" level="LOW"> <product>authoritative:3.4.9</product> </cve> <cve id="CVE-2016-4351" level="LOW"> <product>email_encryption_gateway:5.5</product> </cve> <cve id="CVE-2016-6210" level="MEDIUM"> <product>openssh:7.2</product> </cve> <cve id="CVE-2016-6212" level="LOW"> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.0</product> <product>drupal:7.1</product> <product>drupal:7.2</product> <product>drupal:7.3</product> <product>drupal:7.4</product> <product>drupal:7.5</product> <product>drupal:7.6</product> <product>drupal:7.7</product> <product>drupal:7.8</product> <product>drupal:7.9</product> <product>drupal:7.10</product> <product>drupal:7.11</product> <product>drupal:7.12</product> <product>drupal:7.13</product> <product>drupal:7.14</product> <product>drupal:7.15</product> <product>drupal:7.16</product> <product>drupal:7.17</product> <product>drupal:7.18</product> <product>drupal:7.19</product> <product>drupal:7.20</product> <product>drupal:7.21</product> <product>drupal:7.22</product> <product>drupal:7.23</product> <product>drupal:7.24</product> <product>drupal:7.25</product> <product>drupal:7.26</product> <product>drupal:7.27</product> <product>drupal:7.28</product> <product>drupal:7.29</product> <product>drupal:7.30</product> <product>drupal:7.31</product> <product>drupal:7.32</product> <product>drupal:7.33</product> <product>drupal:7.34</product> <product>drupal:7.35</product> <product>drupal:7.36</product> <product>drupal:7.37</product> <product>drupal:7.38</product> <product>drupal:7.39</product> <product>drupal:7.40</product> <product>drupal:7.41</product> <product>drupal:7.42</product> <product>drupal:7.43</product> <product>drupal:7.x-dev</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.0</product> <product>drupal:8.0.1</product> <product>drupal:8.0.2</product> <product>drupal:8.0.3</product> <product>drupal:8.0.4</product> <product>drupal:8.0.5</product> <product>drupal:8.0.6</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.0</product> <product>drupal:8.1.1</product> <product>drupal:8.1.2</product> </cve> <cve id="CVE-2016-10721" level="LOW"> <product>partclone:0.2.87</product> </cve> <cve id="CVE-2016-3489" level="LOW"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-3488" level="LOW"> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-3487" level="LOW"> <product>webcenter_sites:11.1.1.8</product> <product>webcenter_sites:12.2.1.0</product> </cve> <cve id="CVE-2016-3485" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jre:1.8.0</product> <product>jrockit:r28.3.10</product> </cve> <cve id="CVE-2016-3484" level="LOW"> <product>database:11.2.0.4</product> <product>database:12.1.0.1</product> <product>database:12.1.0.2</product> </cve> <cve id="CVE-2016-3483" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-3481" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-7038" level="LOW"> <product>moodle:2.7.15</product> <product>moodle:2.8</product> <product>moodle:2.8.1</product> <product>moodle:2.8.2</product> <product>moodle:2.8.3</product> <product>moodle:2.8.4</product> <product>moodle:2.8.5</product> <product>moodle:2.8.6</product> <product>moodle:2.8.7</product> <product>moodle:2.8.8</product> <product>moodle:2.8.9</product> <product>moodle:2.8.10</product> <product>moodle:2.8.11</product> <product>moodle:2.8.12</product> <product>moodle:2.9</product> <product>moodle:2.9.1</product> <product>moodle:2.9.2</product> <product>moodle:2.9.3</product> <product>moodle:2.9.4</product> <product>moodle:2.9.5</product> <product>moodle:2.9.6</product> <product>moodle:2.9.7</product> <product>moodle:3.0</product> <product>moodle:3.0.1</product> <product>moodle:3.0.2</product> <product>moodle:3.0.3</product> <product>moodle:3.0.4</product> <product>moodle:3.0.5</product> <product>moodle:3.1.0</product> <product>moodle:3.1.1</product> </cve> <cve id="CVE-2016-7032" level="MEDIUM"> <product>sudo:1.6.8</product> <product>sudo:1.6.9</product> <product>sudo:1.7.0</product> <product>sudo:1.7.1</product> <product>sudo:1.7.2</product> <product>sudo:1.7.3</product> <product>sudo:1.7.4</product> <product>sudo:1.7.5</product> <product>sudo:1.7.6</product> <product>sudo:1.7.7</product> <product>sudo:1.7.8</product> <product>sudo:1.7.9</product> <product>sudo:1.7.10</product> <product>sudo:1.8.0</product> <product>sudo:1.8.1</product> <product>sudo:1.8.2</product> <product>sudo:1.8.3</product> <product>sudo:1.8.4</product> <product>sudo:1.8.5</product> <product>sudo:1.8.6</product> <product>sudo:1.8.7</product> <product>sudo:1.8.8</product> <product>sudo:1.8.9</product> <product>sudo:1.8.10</product> <product>sudo:1.8.11</product> <product>sudo:1.8.12</product> <product>sudo:1.8.13</product> <product>sudo:1.8.14</product> </cve> <cve id="CVE-2016-7033" level="MEDIUM"> <product>jboss_bpm_suite:6.3.2</product> </cve> <cve id="CVE-2016-7030" level="LOW"> <product>freeipa:4.6.0</product> </cve> <cve id="CVE-2016-7031" level="MEDIUM"> <product>ceph:10.0.0</product> <product>ceph_storage:1.3.2</product> </cve> <cve id="CVE-2016-7036" level="LOW"> <product>python-jose:1.3.1</product> </cve> <cve id="CVE-2016-7037" level="LOW"> <product>jwt:1.0.2</product> </cve> <cve id="CVE-2016-7034" level="MEDIUM"> <product>jboss_bpm_suite:6.3.2</product> </cve> <cve id="CVE-2016-4216" level="LOW"> <product>xmp_toolkit:5.1.2</product> </cve> <cve id="CVE-2016-4215" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4214" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4213" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4212" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4211" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-4210" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-3269" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3261" level="HIGH"> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3260" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3267" level="MEDIUM"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3265" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3264" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0680" level="LOW"> <product>peoplesoft_supply_chain_management_eprocurement:9.1</product> <product>peoplesoft_supply_chain_management_eprocurement:9.2</product> </cve> <cve id="CVE-2016-0681" level="LOW"> <product>olap:11.2.0.4</product> <product>olap:12.1.0.1</product> <product>olap:12.1.0.2</product> </cve> <cve id="CVE-2016-0682" level="MEDIUM"> <product>oracle_berkeley_db:11.2.5.0.32</product> <product>oracle_berkeley_db:11.2.5.1.29</product> <product>oracle_berkeley_db:11.2.5.2.42</product> <product>oracle_berkeley_db:11.2.5.3.28</product> <product>oracle_berkeley_db:12.1.6.0.35</product> <product>oracle_berkeley_db:12.1.6.1.26</product> </cve> <cve id="CVE-2016-0683" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0684" level="LOW"> <product>micros_arspos:1.5</product> </cve> <cve id="CVE-2016-0685" level="LOW"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-0686" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-0687" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-0689" level="MEDIUM"> <product>oracle_berkeley_db:11.2.5.0.32</product> <product>oracle_berkeley_db:11.2.5.1.29</product> <product>oracle_berkeley_db:11.2.5.2.42</product> <product>oracle_berkeley_db:11.2.5.3.28</product> <product>oracle_berkeley_db:12.1.6.0.35</product> <product>oracle_berkeley_db:12.1.6.1.26</product> </cve> <cve id="CVE-2016-10187" level="MEDIUM"> <product>calibre:2.74.0</product> </cve> <cve id="CVE-2016-10186" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10185" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10184" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10183" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10182" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10181" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10180" level="LOW"> <product>dwr-932b_firmware:02.02eu</product> </cve> <cve id="CVE-2016-10189" level="LOW"> <product>bitlbee:3.4.2</product> <product>bitlbee-libpurple:3.5</product> </cve> <cve id="CVE-2016-10188" level="LOW"> <product>bitlbee:3.4.2</product> </cve> <cve id="CVE-2016-3147" level="LOW"> <product>landesk_management_suite:10.0.0.271</product> </cve> <cve id="CVE-2016-3144" level="MEDIUM"> <product>block_class:7.x-2.0</product> <product>block_class:7.x-2.1</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-1000144" level="MEDIUM"> <product>photoxhibit:2.1.8</product> </cve> <cve id="CVE-2016-3145" level="LOW"> <product>printer_firmware:atl.021.062</product> <product>printer_firmware:cb.021.062</product> <product>printer_firmware:pp.021.062</product> <product>printer_firmware:yk.021.057</product> <product>printer_firmware:yk.021.062</product> </cve> <cve id="CVE-2016-5234" level="MEDIUM"> <product>rse6500_firmware:v100r001c00</product> <product>vp9600_series_firmware:v200r001c01</product> <product>vp9600_series_firmware:v200r001c02</product> <product>vp9600_series_firmware:v200r001c30</product> </cve> <cve id="CVE-2016-5233" level="MEDIUM"> <product>mate_8_firmware:-</product> </cve> <cve id="CVE-2016-9306" level="LOW"> <product>fbx_software_development_kit:2017.0</product> </cve> <cve id="CVE-2016-9307" level="LOW"> <product>fbx_software_development_kit:2017.0</product> </cve> <cve id="CVE-2016-9304" level="MEDIUM"> <product>fbx_software_development_kit:2017.0</product> </cve> <cve id="CVE-2016-9305" level="LOW"> <product>fbx_software_development_kit:2017.0</product> </cve> <cve id="CVE-2016-5546" level="LOW"> <product>jdk:1.6</product> <product>jdk:1.7</product> <product>jdk:1.8</product> <product>jdk:1.8</product> <product>jre:1.6</product> <product>jre:1.7</product> <product>jre:1.8</product> <product>jre:1.8</product> <product>jrockit:r28.3.12</product> </cve> <cve id="CVE-2016-9488" level="LOW"> <product>applications_manager:12.0</product> <product>applications_manager:13.0</product> </cve> <cve id="CVE-2016-5547" level="LOW"> <product>jdk:1.7</product> <product>jdk:1.8</product> <product>jdk:1.8</product> <product>jre:1.7</product> <product>jre:1.8</product> <product>jre:1.8</product> <product>jrockit:r28.3.12</product> </cve> <cve id="CVE-2016-5302" level="LOW"> <product>xenserver:7.0</product> </cve> <cve id="CVE-2016-5303" level="MEDIUM"> <product>groupware:5.2.15</product> <product>groupware:5.2.15</product> </cve> <cve id="CVE-2016-5301" level="LOW"> <product>libtorrent:1.1</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5306" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-5307" level="LOW"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-5304" level="MEDIUM"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-5305" level="MEDIUM"> <product>endpoint_protection_manager:12.1.6</product> </cve> <cve id="CVE-2016-5309" level="MEDIUM"> <product>advanced_threat_protection:-</product> <product>csapi:10.0.4</product> <product>data_center_security_server:-</product> <product>email_security.cloud:-</product> <product>endpoint_protection:12.1.4</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection:12.1.6</product> <product>endpoint_protection_cloud:-</product> <product>endpoint_protection_cloud:-</product> <product>endpoint_protection_for_small_business:-</product> <product>endpoint_protection_for_small_business:12.1</product> <product>mail_security_for_domino:8.0.9</product> <product>mail_security_for_domino:8.1.2</product> <product>mail_security_for_domino:8.1.3</product> <product>mail_security_for_microsoft_exchange:6.5.8</product> <product>mail_security_for_microsoft_exchange:7.0</product> <product>mail_security_for_microsoft_exchange:7.0.1</product> <product>mail_security_for_microsoft_exchange:7.0.2</product> <product>mail_security_for_microsoft_exchange:7.0.3</product> <product>mail_security_for_microsoft_exchange:7.0.4</product> <product>mail_security_for_microsoft_exchange:7.5</product> <product>mail_security_for_microsoft_exchange:7.5.1</product> <product>mail_security_for_microsoft_exchange:7.5.2</product> <product>mail_security_for_microsoft_exchange:7.5.3</product> <product>mail_security_for_microsoft_exchange:7.5.4</product> <product>messaging_gateway:10.6.1</product> <product>messaging_gateway_for_service_providers:10.5</product> <product>messaging_gateway_for_service_providers:10.6</product> <product>protection_engine:7.0.5</product> <product>protection_engine:7.5.0</product> <product>protection_engine:7.5.1</product> <product>protection_engine:7.5.2</product> <product>protection_engine:7.5.3</product> <product>protection_engine:7.5.4</product> <product>protection_engine:7.5.5</product> <product>protection_engine:7.8.0</product> <product>protection_for_sharepoint_servers:6.0.3</product> <product>protection_for_sharepoint_servers:6.0.4</product> <product>protection_for_sharepoint_servers:6.0.5</product> <product>protection_for_sharepoint_servers:6.0.6</product> <product>protection_for_sharepoint_servers:6.0.7</product> <product>web_gateway:-</product> <product>web_security.cloud:-</product> </cve> <cve id="CVE-2016-0877" level="LOW"> <product>edr_g903_firmware:3.4.11</product> </cve> <cve id="CVE-2016-0876" level="LOW"> <product>edr_g903_firmware:3.4.11</product> </cve> <cve id="CVE-2016-0875" level="LOW"> <product>edr_g903_firmware:3.4.11</product> </cve> <cve id="CVE-2016-0871" level="LOW"> <product>eg2_web_control:4.04p</product> </cve> <cve id="CVE-2016-0870" level="LOW"> <product>tracer_sc:4.2.1134</product> </cve> <cve id="CVE-2016-0879" level="LOW"> <product>edr_g903_firmware:3.4.11</product> </cve> <cve id="CVE-2016-0878" level="LOW"> <product>edr_g903_firmware:3.4.11</product> </cve> <cve id="CVE-2016-2309" level="LOW"> <product>ruh2:-</product> </cve> <cve id="CVE-2016-2308" level="LOW"> <product>your_sha256_hashn:-</product> <product>your_sha256_hash:2.0</product> </cve> <cve id="CVE-2016-2307" level="LOW"> <product>your_sha256_hashn:-</product> <product>your_sha256_hash:2.0</product> </cve> <cve id="CVE-2016-2306" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2305" level="MEDIUM"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2304" level="MEDIUM"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2303" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2302" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2301" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-2300" level="LOW"> <product>integraxor:4.2.4502</product> </cve> <cve id="CVE-2016-9371" level="MEDIUM"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-8920" level="MEDIUM"> <product>kenexa_lms_on_cloud:13.1</product> <product>kenexa_lms_on_cloud:13.2</product> <product>kenexa_lms_on_cloud:13.2.2</product> <product>kenexa_lms_on_cloud:13.2.3</product> <product>kenexa_lms_on_cloud:13.2.4</product> </cve> <cve id="CVE-2016-1580" level="LOW"> <product>ubuntu-core-launcher:1.0.27</product> </cve> <cve id="CVE-2016-8926" level="LOW"> <product>tivoli_application_dependency_discovery_manager:7.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.0</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.1</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.2</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.3</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.4</product> <product>tivoli_application_dependency_discovery_manager:7.2.2.5</product> <product>tivoli_application_dependency_discovery_manager:7.3.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.0</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.1</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.2</product> <product>tivoli_application_dependency_discovery_manager:7.3.0.3</product> </cve> <cve id="CVE-2016-6022" level="MEDIUM"> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> </cve> <cve id="CVE-2016-6023" level="LOW"> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.3.0</product> </cve> <cve id="CVE-2016-6020" level="MEDIUM"> <product>sterling_b2b_integrator:5.2</product> <product>sterling_b2b_integrator:5.2.1</product> <product>sterling_b2b_integrator:5.2.2</product> <product>sterling_b2b_integrator:5.2.4</product> <product>sterling_b2b_integrator:5.2.4.1</product> <product>sterling_b2b_integrator:5.2.4.2</product> <product>sterling_b2b_integrator:5.2.5</product> <product>sterling_b2b_integrator:5.2.6</product> </cve> <cve id="CVE-2016-6021" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> </cve> <cve id="CVE-2016-6026" level="MEDIUM"> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.3.0</product> </cve> <cve id="CVE-2016-6027" level="MEDIUM"> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.3.0</product> </cve> <cve id="CVE-2016-6024" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_collaborative_lifecycle_management:6.0.4</product> <product>rational_doors_next_generation:4.0.1</product> <product>rational_doors_next_generation:4.0.2</product> <product>rational_doors_next_generation:4.0.3</product> <product>rational_doors_next_generation:4.0.4</product> <product>rational_doors_next_generation:4.0.5</product> <product>rational_doors_next_generation:4.0.6</product> <product>rational_doors_next_generation:4.0.7</product> <product>rational_doors_next_generation:5.0</product> <product>rational_doors_next_generation:5.0.1</product> <product>rational_doors_next_generation:5.0.2</product> <product>rational_doors_next_generation:6.0</product> <product>rational_doors_next_generation:6.0.1</product> <product>rational_doors_next_generation:6.0.2</product> <product>rational_doors_next_generation:6.0.3</product> <product>rational_doors_next_generation:6.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.3</product> <product>rational_engineering_lifecycle_manager:4.0.4</product> <product>rational_engineering_lifecycle_manager:4.0.5</product> <product>rational_engineering_lifecycle_manager:4.0.6</product> <product>rational_engineering_lifecycle_manager:4.0.7</product> <product>rational_engineering_lifecycle_manager:5.0</product> <product>rational_engineering_lifecycle_manager:5.0.1</product> <product>rational_engineering_lifecycle_manager:5.0.2</product> <product>rational_engineering_lifecycle_manager:6.0</product> <product>rational_engineering_lifecycle_manager:6.0.1</product> <product>rational_engineering_lifecycle_manager:6.0.2</product> <product>rational_engineering_lifecycle_manager:6.0.3</product> <product>rational_engineering_lifecycle_manager:6.0.4</product> <product>rational_quality_manager:4.0</product> <product>rational_quality_manager:4.0.0.1</product> <product>rational_quality_manager:4.0.0.2</product> <product>rational_quality_manager:4.0.1</product> <product>rational_quality_manager:4.0.2</product> <product>rational_quality_manager:4.0.3</product> <product>rational_quality_manager:4.0.4</product> <product>rational_quality_manager:4.0.5</product> <product>rational_quality_manager:4.0.6</product> <product>rational_quality_manager:4.0.7</product> <product>rational_quality_manager:5.0</product> <product>rational_quality_manager:5.0.1</product> <product>rational_quality_manager:5.0.2</product> <product>rational_quality_manager:6.0</product> <product>rational_quality_manager:6.0.1</product> <product>rational_quality_manager:6.0.2</product> <product>rational_quality_manager:6.0.3</product> <product>rational_quality_manager:6.0.4</product> <product>rational_rhapsody_design_manager:4.0</product> <product>rational_rhapsody_design_manager:4.0.1</product> <product>rational_rhapsody_design_manager:4.0.2</product> <product>rational_rhapsody_design_manager:4.0.3</product> <product>rational_rhapsody_design_manager:4.0.4</product> <product>rational_rhapsody_design_manager:4.0.5</product> <product>rational_rhapsody_design_manager:4.0.6</product> <product>rational_rhapsody_design_manager:4.0.7</product> <product>rational_rhapsody_design_manager:5.0</product> <product>rational_rhapsody_design_manager:5.0.1</product> <product>rational_rhapsody_design_manager:5.0.2</product> <product>rational_rhapsody_design_manager:6.0</product> <product>rational_rhapsody_design_manager:6.0.1</product> <product>rational_rhapsody_design_manager:6.0.2</product> <product>rational_rhapsody_design_manager:6.0.3</product> <product>rational_rhapsody_design_manager:6.0.4</product> <product>rational_software_architect_design_manager:4.0</product> <product>rational_software_architect_design_manager:4.0.1</product> <product>rational_software_architect_design_manager:4.0.2</product> <product>rational_software_architect_design_manager:4.0.3</product> <product>rational_software_architect_design_manager:4.0.4</product> <product>rational_software_architect_design_manager:4.0.5</product> <product>rational_software_architect_design_manager:4.0.6</product> <product>rational_software_architect_design_manager:4.0.7</product> <product>rational_software_architect_design_manager:5.0</product> <product>rational_software_architect_design_manager:5.0.1</product> <product>rational_software_architect_design_manager:5.0.2</product> <product>rational_software_architect_design_manager:6.0</product> <product>rational_software_architect_design_manager:6.0.1</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> <product>rational_team_concert:6.0.4</product> </cve> <cve id="CVE-2016-6025" level="LOW"> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.2.0</product> <product>sterling_secure_proxy:3.4.3.0</product> </cve> <cve id="CVE-2016-6028" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> </cve> <cve id="CVE-2016-6029" level="MEDIUM"> <product>emptoris_strategic_supply_management:10.0.0.0</product> <product>emptoris_strategic_supply_management:10.0.0.1</product> <product>emptoris_strategic_supply_management:10.0.0.2</product> <product>emptoris_strategic_supply_management:10.0.0.3</product> <product>emptoris_strategic_supply_management:10.0.1.0</product> <product>emptoris_strategic_supply_management:10.0.1.1</product> <product>emptoris_strategic_supply_management:10.0.1.2</product> <product>emptoris_strategic_supply_management:10.0.1.3</product> <product>emptoris_strategic_supply_management:10.0.1.4</product> <product>emptoris_strategic_supply_management:10.0.2.0</product> <product>emptoris_strategic_supply_management:10.0.2.1</product> <product>emptoris_strategic_supply_management:10.0.2.2</product> <product>emptoris_strategic_supply_management:10.0.2.3</product> <product>emptoris_strategic_supply_management:10.0.2.4</product> <product>emptoris_strategic_supply_management:10.0.2.5</product> <product>emptoris_strategic_supply_management:10.0.2.6</product> <product>emptoris_strategic_supply_management:10.0.2.7</product> <product>emptoris_strategic_supply_management:10.0.2.8</product> <product>emptoris_strategic_supply_management:10.0.2.9</product> <product>emptoris_strategic_supply_management:10.0.2.10</product> <product>emptoris_strategic_supply_management:10.0.2.11</product> <product>emptoris_strategic_supply_management:10.0.2.12</product> <product>emptoris_strategic_supply_management:10.0.2.13</product> <product>emptoris_strategic_supply_management:10.0.2.14</product> <product>emptoris_strategic_supply_management:10.0.2.15</product> <product>emptoris_strategic_supply_management:10.0.4.0</product> <product>emptoris_strategic_supply_management:10.1.0.0</product> <product>emptoris_strategic_supply_management:10.1.0.1</product> <product>emptoris_strategic_supply_management:10.1.0.2</product> <product>emptoris_strategic_supply_management:10.1.0.3</product> <product>emptoris_strategic_supply_management:10.1.0.4</product> <product>emptoris_strategic_supply_management:10.1.0.5</product> <product>emptoris_strategic_supply_management:10.1.0.6</product> <product>emptoris_strategic_supply_management:10.1.0.7</product> <product>emptoris_strategic_supply_management:10.1.0.8</product> <product>emptoris_strategic_supply_management:10.1.0.9</product> <product>emptoris_strategic_supply_management:10.1.0.10</product> <product>emptoris_strategic_supply_management:10.1.1.0</product> <product>emptoris_strategic_supply_management:10.1.1.1</product> <product>emptoris_strategic_supply_management:10.1.1.2</product> <product>emptoris_strategic_supply_management:10.1.1.3</product> <product>emptoris_strategic_supply_management:10.1.1.4</product> <product>emptoris_strategic_supply_management:10.1.1.5</product> <product>emptoris_strategic_supply_management:10.1.1.6</product> <product>emptoris_strategic_supply_management:10.1.1.7</product> <product>emptoris_strategic_supply_management:10.1.1.8</product> </cve> <cve id="CVE-2016-7472" level="LOW"> <product>big-ip_application_security_manager:12.1.0</product> <product>big-ip_application_security_manager:12.1.1</product> </cve> <cve id="CVE-2016-10686" level="MEDIUM"> <product>fis-sass-all:0.2.0</product> </cve> <cve id="CVE-2016-0423" level="HIGH"> <product>jd_edwards_products:9.1</product> <product>jd_edwards_products:9.2</product> </cve> <cve id="CVE-2016-3018" level="MEDIUM"> <product>security_access_manager:9.0.0</product> <product>security_access_manager:9.0.0.1</product> <product>security_access_manager:9.0.1.0</product> <product>security_access_manager_for_mobile:8.0.0.0</product> <product>security_access_manager_for_mobile:8.0.0.1</product> <product>security_access_manager_for_mobile:8.0.0.2</product> <product>security_access_manager_for_mobile:8.0.0.3</product> <product>security_access_manager_for_mobile:8.0.0.5</product> <product>security_access_manager_for_mobile:8.0.1.0</product> <product>security_access_manager_for_mobile:8.0.1.2</product> <product>security_access_manager_for_mobile:8.0.1.3</product> <product>security_access_manager_for_mobile:8.0.1.4</product> <product>security_access_manager_for_web:8.0.0.0</product> <product>security_access_manager_for_web:8.0.0.1</product> <product>security_access_manager_for_web:8.0.0.2</product> <product>security_access_manager_for_web:8.0.0.3</product> <product>security_access_manager_for_web:8.0.0.5</product> <product>security_access_manager_for_web:8.0.1.0</product> <product>security_access_manager_for_web:8.0.1.2</product> <product>security_access_manager_for_web:8.0.1.3</product> <product>security_access_manager_for_web:8.0.1.4</product> </cve> <cve id="CVE-2016-3019" level="LOW"> <product>security_access_manager_9.0_firmware</product> </cve> <cve id="CVE-2016-6534" level="MEDIUM"> <product>network_management_information_system:4.3.6f</product> <product>network_management_information_system:8.5.10g</product> </cve> <cve id="CVE-2016-6535" level="LOW"> <product>eh6108h%2b_firmware:x9.03.24.00.07l</product> </cve> <cve id="CVE-2016-6536" level="LOW"> <product>eh6108h%2b_firmware:x9.03.24.00.07l</product> </cve> <cve id="CVE-2016-3017" level="LOW"> <product>security_access_manager_9.0_firmware:9.0.0</product> <product>security_access_manager_9.0_firmware:9.0.0.1</product> <product>security_access_manager_9.0_firmware:9.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_mobile_8.0_firmware:8.0.1.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.1</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.2</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.3</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.4</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.5</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.6</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.7</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.8</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.9</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.10</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.11</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.12</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.13</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.14</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.15</product> <product>security_access_manager_for_web_7.0_firmware:7.0.0.16</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.1</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.0.5</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.0</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.2</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.3</product> <product>security_access_manager_for_web_8.0_firmware:8.0.1.4</product> </cve> <cve id="CVE-2016-6530" level="LOW"> <product>cdr_dicom:5.0</product> </cve> <cve id="CVE-2016-6531" level="LOW"> <product>opendental:16.1</product> </cve> <cve id="CVE-2016-6532" level="LOW"> <product>imaging_suite:10.0</product> </cve> <cve id="CVE-2016-3013" level="LOW"> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-7959" level="MEDIUM"> <product>simatic_step_7:13.010</product> </cve> <cve id="CVE-2016-0278" level="MEDIUM"> <product>domino:8.5.0</product> <product>domino:8.5.1</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.2</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.3</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:9.0.0</product> <product>domino:9.0.1</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> </cve> <cve id="CVE-2016-8790" level="LOW"> <product>cloudengine_12800_firmware:v100r003c10</product> <product>cloudengine_12800_firmware:v100r005c00</product> <product>cloudengine_12800_firmware:v100r005c10</product> <product>cloudengine_12800_firmware:v100r006c00</product> <product>cloudengine_5800_firmware:v100r003c10</product> <product>cloudengine_5800_firmware:v100r005c00</product> <product>cloudengine_5800_firmware:v100r005c10</product> <product>cloudengine_5800_firmware:v100r006c00</product> <product>cloudengine_6800_firmware:v100r003c10</product> <product>cloudengine_6800_firmware:v100r005c00</product> <product>cloudengine_6800_firmware:v100r005c10</product> <product>cloudengine_6800_firmware:v100r006c00</product> <product>cloudengine_7800_firmware:v100r003c10</product> <product>cloudengine_7800_firmware:v100r005c00</product> <product>cloudengine_7800_firmware:v100r005c10</product> <product>cloudengine_7800_firmware:v100r006c00</product> <product>cloudengine_8800_firmware:v100r006c00</product> </cve> <cve id="CVE-2016-8791" level="HIGH"> <product>mate_8_firmware:-</product> <product>mate_s_firmware:-</product> <product>p8_firmware:-</product> </cve> <cve id="CVE-2016-8796" level="LOW"> <product>usg9520_firmware:v300r001c01</product> <product>usg9560_firmware:v300r001c01</product> <product>usg9580_firmware:v300r001c01</product> </cve> <cve id="CVE-2016-8797" level="LOW"> <product>ar3200_firmware:v200r005c20</product> <product>ar3200_firmware:v200r005c32</product> <product>ar3200_firmware:v200r007c00</product> <product>s12700_firmware:v200r007c00</product> <product>s12700_firmware:v200r008c00</product> <product>s5300_firmware:v200r006c00</product> <product>s5300_firmware:v200r007c00</product> <product>s5300_firmware:v200r008c00</product> <product>s5700_firmware:v200r006c00</product> <product>s5700_firmware:v200r007c00</product> <product>s5700_firmware:v200r008c00</product> <product>s6300_firmware:v200r007c00</product> <product>s6300_firmware:v200r008c00</product> <product>s6700_firmware:v200r007c00</product> <product>s6700_firmware:v200r008c00</product> <product>s7700_firmware:v200r006c00</product> <product>s7700_firmware:v200r007c00</product> <product>s7700_firmware:v200r008c00</product> <product>s9300_firmware:v200r006c00</product> <product>s9300_firmware:v200r007c00</product> <product>s9300_firmware:v200r008c00</product> <product>s9700_firmware:v200r006c00</product> <product>s9700_firmware:v200r007c00</product> <product>s9700_firmware:v200r008c00</product> </cve> <cve id="CVE-2016-8794" level="HIGH"> <product>mate_8_firmware:-</product> <product>mate_s_firmware:-</product> <product>p8_firmware:-</product> </cve> <cve id="CVE-2016-8795" level="MEDIUM"> <product>cloudengine_12800_firmware:v100r002c00</product> <product>cloudengine_12800_firmware:v100r003c00</product> <product>cloudengine_12800_firmware:v100r003c10</product> <product>cloudengine_12800_firmware:v100r005c00</product> <product>cloudengine_12800_firmware:v100r005c10</product> <product>cloudengine_12800_firmware:v100r006c00</product> <product>cloudengine_5800_firmware:v100r002c00</product> <product>cloudengine_5800_firmware:v100r003c00</product> <product>cloudengine_5800_firmware:v100r003c10</product> <product>cloudengine_5800_firmware:v100r005c00</product> <product>cloudengine_5800_firmware:v100r005c10</product> <product>cloudengine_5800_firmware:v100r006c00</product> <product>cloudengine_6800_firmware:v100r002c00</product> <product>cloudengine_6800_firmware:v100r003c00</product> <product>cloudengine_6800_firmware:v100r003c10</product> <product>cloudengine_6800_firmware:v100r005c00</product> <product>cloudengine_6800_firmware:v100r005c10</product> <product>cloudengine_6800_firmware:v100r006c00</product> <product>cloudengine_7800_firmware:v100r003c00</product> <product>cloudengine_7800_firmware:v100r003c10</product> <product>cloudengine_7800_firmware:v100r005c00</product> <product>cloudengine_7800_firmware:v100r005c10</product> <product>cloudengine_7800_firmware:v100r006c00</product> <product>cloudengine_8800_firmware:v100r006c00</product> <product>secospace_usg6600_firmware:v500r001c00</product> </cve> <cve id="CVE-2016-7951" level="LOW"> <product>libxtst:1.2.2</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7950" level="LOW"> <product>libxrender:0.9.9</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7953" level="LOW"> <product>libxvmc:1.0.9</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-0272" level="MEDIUM"> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-0275" level="LOW"> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-0274" level="MEDIUM"> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:2.1.1.2</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-0277" level="MEDIUM"> <product>domino:8.5.0</product> <product>domino:8.5.1</product> <product>domino:8.5.1.1</product> <product>domino:8.5.1.2</product> <product>domino:8.5.1.3</product> <product>domino:8.5.1.4</product> <product>domino:8.5.2</product> <product>domino:8.5.2.1</product> <product>domino:8.5.2.2</product> <product>domino:8.5.2.3</product> <product>domino:8.5.3</product> <product>domino:8.5.3.1</product> <product>domino:8.5.3.2</product> <product>domino:8.5.3.3</product> <product>domino:8.5.3.4</product> <product>domino:8.5.3.5</product> <product>domino:9.0.0</product> <product>domino:9.0.1</product> <product>domino:9.0.1.1</product> <product>domino:9.0.1.2</product> <product>domino:9.0.1.3</product> <product>domino:9.0.1.4</product> <product>domino:9.0.1.5</product> </cve> <cve id="CVE-2016-0276" level="LOW"> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.0</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.1</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.2</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.3</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.4</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.5</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.6</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.7</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.8</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.9</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.10</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.11</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> <product>financial_transaction_manager:3.0.0.12</product> </cve> <cve id="CVE-2016-4978" level="MEDIUM"> <product>activemq_artemis:1.0.0</product> <product>activemq_artemis:1.1.0</product> <product>activemq_artemis:1.2.0</product> <product>activemq_artemis:1.3.0</product> </cve> <cve id="CVE-2016-4972" level="LOW"> <product>mitaka-murano:2.0.0</product> <product>murano:1.0.2</product> <product>murano-dashboard:1.0.2</product> <product>python-muranoclient:0.7.2</product> </cve> <cve id="CVE-2016-4973" level="LOW"> <product>libssp:-</product> </cve> <cve id="CVE-2016-4970" level="LOW"> <product>netty:4.0.0</product> <product>netty:4.0.1</product> <product>netty:4.0.2</product> <product>netty:4.0.3</product> <product>netty:4.0.4</product> <product>netty:4.0.5</product> <product>netty:4.0.6</product> <product>netty:4.0.7</product> <product>netty:4.0.8</product> <product>netty:4.0.9</product> <product>netty:4.0.10</product> <product>netty:4.0.11</product> <product>netty:4.0.12</product> <product>netty:4.0.13</product> <product>netty:4.0.14</product> <product>netty:4.0.15</product> <product>netty:4.0.16</product> <product>netty:4.0.17</product> <product>netty:4.0.18</product> <product>netty:4.0.19</product> <product>netty:4.0.20</product> <product>netty:4.0.21</product> <product>netty:4.0.22</product> <product>netty:4.0.23</product> <product>netty:4.0.24</product> <product>netty:4.0.25</product> <product>netty:4.0.26</product> <product>netty:4.0.27</product> <product>netty:4.0.28</product> <product>netty:4.0.29</product> <product>netty:4.0.30</product> <product>netty:4.0.31</product> <product>netty:4.0.32</product> <product>netty:4.0.33</product> <product>netty:4.0.34</product> <product>netty:4.0.35</product> <product>netty:4.0.36</product> <product>netty:4.1</product> </cve> <cve id="CVE-2016-4976" level="LOW"> <product>ambari:2.0.0</product> <product>ambari:2.0.1</product> <product>ambari:2.0.2</product> <product>ambari:2.1.0</product> <product>ambari:2.1.1</product> <product>ambari:2.1.2</product> <product>ambari:2.2.0</product> <product>ambari:2.2.1</product> <product>ambari:2.2.2</product> </cve> <cve id="CVE-2016-4977" level="LOW"> <product>spring_security_oauth:1.0.0</product> <product>spring_security_oauth:1.0.1</product> <product>spring_security_oauth:1.0.2</product> <product>spring_security_oauth:1.0.3</product> <product>spring_security_oauth:1.0.4</product> <product>spring_security_oauth:1.0.5</product> <product>spring_security_oauth:2.0.0</product> <product>spring_security_oauth:2.0.1</product> <product>spring_security_oauth:2.0.2</product> <product>spring_security_oauth:2.0.3</product> <product>spring_security_oauth:2.0.4</product> <product>spring_security_oauth:2.0.5</product> <product>spring_security_oauth:2.0.6</product> <product>spring_security_oauth:2.0.7</product> <product>spring_security_oauth:2.0.8</product> <product>spring_security_oauth:2.0.9</product> </cve> <cve id="CVE-2016-4974" level="MEDIUM"> <product>amqp_0-x_jms_client:6.0.3</product> <product>jms_client_amqp:0.9.0</product> </cve> <cve id="CVE-2016-10064" level="MEDIUM"> <product>imagemagick:6.9.5-0</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-10065" level="MEDIUM"> <product>imagemagick:6.9.7-10</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-10066" level="MEDIUM"> <product>imagemagick:6.9.4-4</product> </cve> <cve id="CVE-2016-10067" level="LOW"> <product>imagemagick:6.9.4-4</product> </cve> <cve id="CVE-2016-10060" level="MEDIUM"> <product>imagemagick:7.0.1-9</product> </cve> <cve id="CVE-2016-10061" level="MEDIUM"> <product>imagemagick:7.0.1-9</product> </cve> <cve id="CVE-2016-10062" level="MEDIUM"> <product>imagemagick:-</product> </cve> <cve id="CVE-2016-10063" level="MEDIUM"> <product>imagemagick:6.9.5-0</product> </cve> <cve id="CVE-2016-10068" level="MEDIUM"> <product>imagemagick:6.9.6-3</product> <product>leap:42.1</product> <product>leap:42.2</product> </cve> <cve id="CVE-2016-10069" level="MEDIUM"> <product>imagemagick:6.9.4-4</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-8534" level="LOW"> <product>matrix_operating_environment:7.6</product> </cve> <cve id="CVE-2016-8535" level="MEDIUM"> <product>matrix_operating_environment:7.6</product> </cve> <cve id="CVE-2016-8532" level="MEDIUM"> <product>matrix_operating_environment:7.6</product> </cve> <cve id="CVE-2016-8533" level="LOW"> <product>matrix_operating_environment:7.6</product> </cve> <cve id="CVE-2016-8530" level="LOW"> <product>intelligent_management_center:7.2</product> <product>intelligent_management_center:7.2</product> </cve> <cve id="CVE-2016-8531" level="LOW"> <product>matrix_operating_environment:7.6</product> </cve> <cve id="CVE-2016-9118" level="LOW"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-2536" level="MEDIUM"> <product>sketchup</product> <product>3d_visual_enterprise_viewer</product> </cve> <cve id="CVE-2016-2537" level="LOW"> <product>is_my_json_valid:2.12.3</product> </cve> <cve id="CVE-2016-9113" level="LOW"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-9112" level="LOW"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-9111" level="LOW"> <product>receiver_desktop:4.5</product> </cve> <cve id="CVE-2016-9117" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-9116" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-9115" level="MEDIUM"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-9114" level="LOW"> <product>openjpeg:2.1.2</product> </cve> <cve id="CVE-2016-1324" level="LOW"> <product>spark:2015-06_base</product> </cve> <cve id="CVE-2016-1325" level="LOW"> <product>dpc3939_wireless_residential_voice_gateway_firmware:130514acmcst_base</product> </cve> <cve id="CVE-2016-1326" level="LOW"> <product>dpq3925_8x4_docsis_3.your_sha256_hasher:r1_base</product> </cve> <cve id="CVE-2016-1327" level="LOW"> <product>dpc2203_cable_modem_firmware:r1_customer_image_base</product> <product>epc2203_cable_modem_firmware:r1_customer_image_base</product> </cve> <cve id="CVE-2016-4792" level="LOW"> <product>pulse_connect_secure:8.2</product> </cve> <cve id="CVE-2016-4793" level="LOW"> <product>cakephp:3.2.4</product> </cve> <cve id="CVE-2016-1322" level="LOW"> <product>spark:2015-07-04_base</product> </cve> <cve id="CVE-2016-1323" level="LOW"> <product>spark:2015-06_base</product> </cve> <cve id="CVE-2016-1328" level="LOW"> <product>epc3928_firmware:-</product> </cve> <cve id="CVE-2016-1329" level="LOW"> <product>nx-os:6.0%5c%282%5c%29a6%5c%281%5c%29</product> <product>nx-os:6.0%5c%282%5c%29a6%5c%282%5c%29</product> <product>nx-os:6.0%5c%282%5c%29a6%5c%283%5c%29</product> <product>nx-os:6.0%5c%282%5c%29a6%5c%284%5c%29</product> <product>nx-os:6.0%5c%282%5c%29a6%5c%285%5c%29</product> <product>nx-os:6.0%5c%282%5c%29u6%5c%281%5c%29</product> <product>nx-os:6.0%5c%282%5c%29u6%5c%282%5c%29</product> <product>nx-os:6.0%5c%282%5c%29u6%5c%283%5c%29</product> <product>nx-os:6.0%5c%282%5c%29u6%5c%284%5c%29</product> <product>nx-os:6.0%5c%282%5c%29u6%5c%285%5c%29</product> <product>nx-ox:6.0%5c%282%5c%29a7%5c%281%5c%29</product> </cve> <cve id="CVE-2016-0442" level="LOW"> <product>enterprise_manager_grid_control:12.1.0.4</product> <product>enterprise_manager_grid_control:12.1.0.5</product> </cve> <cve id="CVE-2016-5445" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5447" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5446" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5449" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-5448" level="LOW"> <product>integrated_lights_out_manager_firmware:3.0</product> <product>integrated_lights_out_manager_firmware:3.1</product> <product>integrated_lights_out_manager_firmware:3.2</product> </cve> <cve id="CVE-2016-9987" level="MEDIUM"> <product>jazz_reporting_service:5.0</product> <product>jazz_reporting_service:5.0.1</product> <product>jazz_reporting_service:5.0.2</product> <product>jazz_reporting_service:6.0</product> <product>jazz_reporting_service:6.0.1</product> <product>jazz_reporting_service:6.0.2</product> <product>jazz_reporting_service:6.0.3</product> </cve> <cve id="CVE-2016-6237" level="MEDIUM"> <product>lepton:1.0</product> </cve> <cve id="CVE-2016-6236" level="MEDIUM"> <product>lepton:1.0</product> </cve> <cve id="CVE-2016-6235" level="MEDIUM"> <product>lepton:1.0</product> </cve> <cve id="CVE-2016-6234" level="MEDIUM"> <product>lepton:1.0</product> </cve> <cve id="CVE-2016-6233" level="LOW"> <product>zend_framework:1.12.19</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-6231" level="MEDIUM"> <product>safe_browser:1.6.0</product> </cve> <cve id="CVE-2016-6239" level="LOW"> <product>openbsd:5.8</product> <product>openbsd:5.9</product> </cve> <cve id="CVE-2016-6238" level="MEDIUM"> <product>lepton:1.0</product> </cve> <cve id="CVE-2016-9982" level="LOW"> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-9983" level="MEDIUM"> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-6945" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6944" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6947" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6946" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6941" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6940" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6943" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6942" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6493" level="LOW"> <product>xenapp:6.0.0.0</product> <product>xenapp:6.5.0.0</product> <product>xenapp:7.0.0.0</product> <product>xenapp:7.1.0.0</product> <product>xenapp:7.5.0.0</product> <product>xenapp:7.6.0.0</product> <product>xenapp:7.7.0.0</product> <product>xenapp:7.8.0.0</product> <product>xendesktop:7.8</product> </cve> <cve id="CVE-2016-6490" level="LOW"> <product>qemu:-</product> </cve> <cve id="CVE-2016-6497" level="LOW"> <product>groovy</product> </cve> <cve id="CVE-2016-6496" level="LOW"> <product>crowd:2.8.4</product> <product>crowd:2.9.0</product> <product>crowd:2.9.1</product> </cve> <cve id="CVE-2016-6495" level="MEDIUM"> <product>data_ontap:8.2.4</product> </cve> <cve id="CVE-2016-6494" level="LOW"> <product>mongodb:1.2.0</product> <product>mongodb:1.4.0</product> <product>mongodb:1.6.0</product> <product>mongodb:1.8.0</product> <product>mongodb:2.0.0</product> <product>mongodb:2.0.1</product> <product>mongodb:2.0.2</product> <product>mongodb:2.0.3</product> <product>mongodb:2.0.4</product> <product>mongodb:2.0.5</product> <product>mongodb:2.0.6</product> <product>mongodb:2.0.7</product> <product>mongodb:2.0.8</product> <product>mongodb:2.2.0</product> <product>mongodb:2.2.1</product> <product>mongodb:2.2.2</product> <product>mongodb:2.2.3</product> <product>mongodb:2.2.4</product> <product>mongodb:2.2.5</product> <product>mongodb:2.2.6</product> <product>mongodb:2.2.7</product> <product>mongodb:2.3.0</product> <product>mongodb:2.3.1</product> <product>mongodb:2.4.0</product> <product>mongodb:2.4.1</product> <product>mongodb:2.4.2</product> <product>mongodb:2.4.3</product> <product>mongodb:2.4.4</product> <product>mongodb:2.4.5</product> <product>mongodb:2.4.6</product> <product>mongodb:2.4.7</product> <product>mongodb:2.4.8</product> <product>mongodb:2.4.9</product> <product>mongodb:2.4.10</product> <product>mongodb:2.4.11</product> <product>mongodb:2.4.12</product> <product>mongodb:2.4.13</product> <product>mongodb:2.4.14</product> <product>mongodb:2.5.0</product> <product>mongodb:2.5.1</product> <product>mongodb:2.6.0</product> <product>mongodb:2.6.1</product> <product>mongodb:2.6.2</product> <product>mongodb:2.6.3</product> <product>mongodb:2.6.4</product> <product>mongodb:2.6.5</product> <product>mongodb:2.6.6</product> <product>mongodb:2.6.7</product> <product>mongodb:2.6.8</product> <product>mongodb:2.6.9</product> <product>mongodb:2.6.10</product> <product>mongodb:2.6.11</product> <product>mongodb:2.6.12</product> <product>mongodb:3.0</product> <product>mongodb:3.0.1</product> <product>mongodb:3.0.2</product> <product>mongodb:3.0.3</product> <product>mongodb:3.0.4</product> <product>mongodb:3.0.5</product> <product>mongodb:3.0.6</product> <product>mongodb:3.0.7</product> <product>mongodb:3.0.8</product> <product>mongodb:3.0.9</product> <product>mongodb:3.0.10</product> <product>mongodb:3.0.11</product> <product>mongodb:3.0.12</product> <product>mongodb:3.0.13</product> <product>mongodb:3.0.14</product> <product>mongodb:3.2</product> <product>mongodb:3.2.1</product> <product>mongodb:3.2.2</product> <product>mongodb:3.2.3</product> <product>mongodb:3.2.4</product> <product>mongodb:3.2.5</product> <product>mongodb:3.2.6</product> <product>mongodb:3.2.7</product> <product>mongodb:3.2.8</product> <product>mongodb:3.2.9</product> <product>mongodb:3.2.10</product> <product>mongodb:3.2.11</product> <product>mongodb:3.2.12</product> <product>mongodb:3.2.13</product> <product>mongodb:3.3</product> <product>mongodb:3.3.1</product> <product>mongodb:3.3.2</product> <product>mongodb:3.3.3</product> <product>mongodb:3.3.4</product> <product>mongodb:3.3.5</product> <product>mongodb:3.3.6</product> <product>mongodb:3.3.7</product> <product>mongodb:3.3.8</product> <product>mongodb:3.3.9</product> <product>mongodb:3.3.10</product> <product>mongodb:3.3.11</product> <product>mongodb:3.3.12</product> <product>mongodb:3.3.13</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-4253" level="LOW"> <product>experience_manager:5.6.1</product> <product>experience_manager:6.0.0</product> <product>experience_manager:6.1.0</product> <product>experience_manager:6.2.0</product> </cve> <cve id="CVE-2016-4252" level="LOW"> <product>acrobat:11.0.16</product> <product>acrobat_dc:15.006.30174</product> <product>acrobat_dc:15.016.20045</product> <product>acrobat_reader_dc:15.006.30174</product> <product>acrobat_reader_dc:15.016.20045</product> <product>reader:11.0.16</product> </cve> <cve id="CVE-2016-7010" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7547" level="LOW"> <product>threat_discovery_appliance:2.6.1062</product> </cve> <cve id="CVE-2016-7544" level="LOW"> <product>crypto%2b%2b:5.6.4</product> </cve> <cve id="CVE-2016-7013" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7542" level="LOW"> <product>fortios:5.2.0</product> <product>fortios:5.2.1</product> <product>fortios:5.2.2</product> <product>fortios:5.2.3</product> <product>fortios:5.2.4</product> <product>fortios:5.2.5</product> <product>fortios:5.2.6</product> <product>fortios:5.2.7</product> <product>fortios:5.2.8</product> <product>fortios:5.2.9</product> <product>fortios:5.4.0</product> <product>fortios:5.4.1</product> </cve> <cve id="CVE-2016-7543" level="LOW"> <product>bash:4.3</product> <product>fedora:23</product> <product>fedora:24</product> <product>fedora:25</product> </cve> <cve id="CVE-2016-7540" level="MEDIUM"> <product>imagemagick:6.9.4-9</product> </cve> <cve id="CVE-2016-7541" level="MEDIUM"> <product>fortios:5.0.0</product> <product>fortios:5.0.1</product> <product>fortios:5.0.2</product> <product>fortios:5.0.3</product> <product>fortios:5.0.4</product> <product>fortios:5.0.5</product> <product>fortios:5.0.6</product> <product>fortios:5.0.7</product> <product>fortios:5.0.8</product> <product>fortios:5.0.9</product> <product>fortios:5.0.10</product> <product>fortios:5.0.11</product> <product>fortios:5.0.12</product> <product>fortios:5.0.13</product> <product>fortios:5.0.14</product> <product>fortios:5.2.0</product> <product>fortios:5.2.1</product> <product>fortios:5.2.2</product> <product>fortios:5.2.3</product> <product>fortios:5.2.4</product> <product>fortios:5.2.5</product> <product>fortios:5.2.6</product> <product>fortios:5.2.7</product> <product>fortios:5.2.8</product> <product>fortios:5.2.9</product> <product>fortios:5.2.10</product> </cve> <cve id="CVE-2016-1913" level="MEDIUM"> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.0</product> <product>redhen:7.x-1.1</product> <product>redhen:7.x-1.2</product> <product>redhen:7.x-1.3</product> <product>redhen:7.x-1.4</product> <product>redhen:7.x-1.5</product> <product>redhen:7.x-1.6</product> <product>redhen:7.x-1.7</product> <product>redhen:7.x-1.8</product> <product>redhen:7.x-1.10</product> <product>redhen:7.x-1.x</product> </cve> <cve id="CVE-2016-1912" level="MEDIUM"> <product>dolibarr:3.8.2</product> </cve> <cve id="CVE-2016-1911" level="MEDIUM"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-1910" level="LOW"> <product>netweaver:7.40</product> </cve> <cve id="CVE-2016-1917" level="MEDIUM"> <product>enterprise_server:12.4</product> </cve> <cve id="CVE-2016-1916" level="MEDIUM"> <product>enterprise_server:12.4</product> </cve> <cve id="CVE-2016-1915" level="MEDIUM"> <product>blackberry_enterprise_service:12.3.1</product> </cve> <cve id="CVE-2016-1914" level="MEDIUM"> <product>blackberry_enterprise_service:12.3.1</product> </cve> <cve id="CVE-2016-4891" level="MEDIUM"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4890" level="LOW"> <product>servicedesk_plus:9.1</product> </cve> <cve id="CVE-2016-4893" level="LOW"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4892" level="MEDIUM"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4895" level="LOW"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4894" level="LOW"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4897" level="MEDIUM"> <product>usermin:1.680</product> </cve> <cve id="CVE-2016-4896" level="LOW"> <product>setucocms:-</product> </cve> <cve id="CVE-2016-4899" level="LOW"> <product>novabackup_datacenter:-</product> </cve> <cve id="CVE-2016-4898" level="LOW"> <product>novabackup_datacenter:-</product> </cve> <cve id="CVE-2016-3202" level="HIGH"> <product>chakra_javascript</product> <product>jscript</product> <product>vbscript</product> </cve> <cve id="CVE-2016-3205" level="HIGH"> <product>jscript:5.8</product> <product>vbscript:5.7</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-3204" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-3207" level="HIGH"> <product>jscript:5.8</product> <product>vbscript:5.7</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-3206" level="HIGH"> <product>jscript:5.8</product> <product>vbscript:5.7</product> <product>vbscript:5.8</product> </cve> <cve id="CVE-2016-4259" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-4258" level="LOW"> <product>digital_editions:4.5.1</product> </cve> <cve id="CVE-2016-0521" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-9625" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9624" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9155" level="LOW"> <product>ccid1445-dn18_firmware:-</product> <product>ccid1445-dn28_firmware:-</product> <product>ccid1445-dn36_firmware:-</product> <product>ccis1425_firmware:-</product> <product>ccmd3025-dn18_firmware:-</product> <product>ccms2025_firmware:-</product> <product>ccmw1025_firmware:-</product> <product>ccmw3025_firmware:-</product> <product>ccpw3025_firmware:-</product> <product>cfis1425_firmware:-</product> <product>cfms2025_firmware:-</product> <product>cfmw1025_firmware:-</product> <product>cfmw3025_firmware:-</product> <product>cvms2025-ir_firmware:-</product> <product>cvmw3025-ir_firmware:-</product> </cve> <cve id="CVE-2016-0520" level="MEDIUM"> <product>application_object_library:11.5.10.2</product> </cve> <cve id="CVE-2016-9626" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-2867" level="MEDIUM"> <product>infosphere_streams:4.0.1.1</product> <product>streams:4.1.1.0</product> </cve> <cve id="CVE-2016-9623" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-2865" level="LOW"> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> </cve> <cve id="CVE-2016-0522" level="LOW"> <product>retail_open_commerce_platform_cloud_service:3.5</product> <product>retail_open_commerce_platform_cloud_service:4.5</product> <product>retail_open_commerce_platform_cloud_service:4.7</product> <product>retail_open_commerce_platform_cloud_service:5.0</product> </cve> <cve id="CVE-2016-4099" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4098" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4091" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4090" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4093" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4092" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4095" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-4094" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4097" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4096" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-5328" level="LOW"> <product>tools:9.0.0</product> <product>tools:9.0.1</product> <product>tools:9.0.5</product> <product>tools:9.0.10</product> <product>tools:9.0.11</product> <product>tools:9.0.12</product> <product>tools:9.0.13</product> <product>tools:9.0.15</product> <product>tools:9.0.16</product> <product>tools:9.0.17</product> <product>tools:9.4.0</product> <product>tools:9.4.5</product> <product>tools:9.4.10</product> <product>tools:9.4.11</product> <product>tools:9.4.12</product> <product>tools:9.4.15</product> <product>tools:9.10.0</product> <product>tools:9.10.1</product> <product>tools:9.10.5</product> <product>tools:10.0.0</product> <product>tools:10.0.5</product> <product>tools:10.0.6</product> <product>tools:10.0.8</product> </cve> <cve id="CVE-2016-5329" level="LOW"> <product>fusion:8.0.0</product> <product>fusion:8.0.1</product> <product>fusion:8.0.2</product> <product>fusion:8.1.0</product> <product>fusion:8.1.1</product> </cve> <cve id="CVE-2016-4923" level="MEDIUM"> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4</product> <product>junos:11.4r13</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> <product>junos:15.1</product> <product>junos:15.1x49</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> <product>junos:15.1x53</product> </cve> <cve id="CVE-2016-5321" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>opensuse:13.1</product> </cve> <cve id="CVE-2016-5323" level="LOW"> <product>libtiff:4.0.6</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-5852" level="LOW"> <product>geforce_experience:-</product> </cve> <cve id="CVE-2016-5850" level="MEDIUM"> <product>public_cloud_solution:1.0.0</product> </cve> <cve id="CVE-2016-5851" level="MEDIUM"> <product>python-docx:0.8.5</product> </cve> <cve id="CVE-2016-3045" level="MEDIUM"> <product>security_access_manager:9.0.0</product> <product>security_access_manager:9.0.0.1</product> <product>security_access_manager:9.0.1.0</product> <product>security_access_manager_for_mobile:8.0.0.0</product> <product>security_access_manager_for_mobile:8.0.0.5</product> <product>security_access_manager_for_mobile:8.0.1</product> <product>security_access_manager_for_mobile:8.0.1.2</product> <product>security_access_manager_for_mobile:8.0.1.3</product> <product>security_access_manager_for_mobile:8.0.1.4</product> <product>security_access_manager_for_web:7.0.0</product> <product>security_access_manager_for_web:8.0.0</product> <product>security_access_manager_for_web:8.0.1</product> <product>security_access_manager_for_web:8.0.1.1</product> <product>security_access_manager_for_web:8.0.1.2</product> <product>security_access_manager_for_web:8.0.1.3</product> <product>security_access_manager_for_web:8.0.1.4</product> </cve> <cve id="CVE-2016-10309" level="LOW"> <product>fibeair_ip-10_firmware:7.1.0</product> </cve> <cve id="CVE-2016-10308" level="LOW"> <product>etherhaul_firmware:3.7.0</product> <product>etherhaul_firmware:6.0</product> </cve> <cve id="CVE-2016-10305" level="LOW"> <product>apex_firmware:2.1.1</product> <product>apex_lynx_firmware:1.2.3</product> <product>apex_orion_firmware:1.2.3</product> <product>apex_plus_firmware:3.2.0</product> <product>giga_firmware:2.6.1</product> <product>giga_lynx_firmware:1.2.3</product> <product>giga_orion_firmware:1.2.3</product> <product>giga_plus_firmware:3.2.3</product> <product>giga_pro_firmware:1.4.1</product> <product>stratalink_firmware:2.2.0</product> <product>stratalink_pro_firmware:-</product> </cve> <cve id="CVE-2016-10304" level="LOW"> <product>netweaver:7.5</product> </cve> <cve id="CVE-2016-10307" level="LOW"> <product>apex_lynx_firmware:2.0</product> <product>apex_orion_firmware:2.0</product> <product>giga_lynx_firmware:2.0</product> <product>giga_orion_firmware:2.0</product> <product>stratalink_firmware:3.0</product> </cve> <cve id="CVE-2016-10306" level="LOW"> <product>a600_firmware:-</product> </cve> <cve id="CVE-2016-8219" level="LOW"> <product>capi-release:1.11.0</product> <product>cf-release:249</product> </cve> <cve id="CVE-2016-8218" level="LOW"> <product>cf-release:203</product> <product>cf-release:204</product> <product>cf-release:205</product> <product>cf-release:206</product> <product>cf-release:207</product> <product>cf-release:208</product> <product>cf-release:209</product> <product>cf-release:210</product> <product>cf-release:211</product> <product>cf-release:212</product> <product>cf-release:213</product> <product>cf-release:214</product> <product>cf-release:215</product> <product>cf-release:217</product> <product>cf-release:218</product> <product>cf-release:219</product> <product>cf-release:220</product> <product>cf-release:221</product> <product>cf-release:222</product> <product>cf-release:223</product> <product>cf-release:224</product> <product>cf-release:225</product> <product>cf-release:226</product> <product>cf-release:227</product> <product>cf-release:228</product> <product>cf-release:229</product> <product>cf-release:230</product> <product>cf-release:231</product> <product>routing-release:0.141.0</product> </cve> <cve id="CVE-2016-3120" level="LOW"> <product>kerberos:5-1.13</product> <product>kerberos:5-1.13.1</product> <product>kerberos:5-1.13.2</product> <product>kerberos:5-1.13.3</product> <product>kerberos:5-1.13.4</product> <product>kerberos:5-1.13.5</product> <product>kerberos:5-1.13.6</product> <product>kerberos:5-1.14</product> <product>kerberos:5-1.14.1</product> <product>kerberos:5-1.14.2</product> </cve> <cve id="CVE-2016-4038" level="LOW"> <product>samsung_mobile:4.4</product> <product>samsung_mobile:5.0</product> <product>samsung_mobile:5.1</product> </cve> <cve id="CVE-2016-6442" level="MEDIUM"> <product>finesse:11.0%281%29_base</product> </cve> <cve id="CVE-2016-1517" level="MEDIUM"> <product>opencv:3.0.0</product> </cve> <cve id="CVE-2016-6443" level="LOW"> <product>evolved_programmable_network_manager:1.2.0</product> <product>evolved_programmable_network_manager:2.0.0</product> <product>prime_infrastructure:1.2.0</product> <product>prime_infrastructure:1.2.0.103</product> <product>prime_infrastructure:1.2.1</product> <product>prime_infrastructure:1.3.0</product> <product>prime_infrastructure:1.3.0.20</product> <product>prime_infrastructure:1.4.0</product> <product>prime_infrastructure:1.4.0.45</product> <product>prime_infrastructure:1.4.1</product> <product>prime_infrastructure:1.4.2</product> <product>prime_infrastructure:2.0.0</product> <product>prime_infrastructure:2.1.0</product> <product>prime_infrastructure:2.2%282%29</product> <product>prime_infrastructure:2.2.0</product> <product>prime_infrastructure:3.0.0</product> <product>prime_infrastructure:3.0_base</product> <product>prime_infrastructure:3.1.0</product> <product>prime_infrastructure:3.1.1</product> <product>prime_infrastructure:3.1_base</product> </cve> <cve id="CVE-2016-0529" level="LOW"> <product>customer_interaction_history:12.1.1</product> <product>customer_interaction_history:12.1.2</product> <product>customer_interaction_history:12.1.3</product> <product>customer_interaction_history:12.2.3</product> <product>customer_interaction_history:12.2.4</product> <product>customer_interaction_history:12.2.5</product> </cve> <cve id="CVE-2016-1516" level="MEDIUM"> <product>opencv:3.0.0</product> </cve> <cve id="CVE-2016-6332" level="LOW"> <product>mediawiki:1.23.14</product> <product>mediawiki:1.26.0</product> <product>mediawiki:1.26.1</product> <product>mediawiki:1.26.2</product> <product>mediawiki:1.26.3</product> <product>mediawiki:1.26.4</product> <product>mediawiki:1.27.0</product> </cve> <cve id="CVE-2016-3125" level="LOW"> <product>proftpd:1.3.5</product> <product>proftpd:1.3.6</product> <product>fedora:22</product> <product>fedora:23</product> <product>opensuse:13.1</product> </cve> <cve id="CVE-2016-3126" level="MEDIUM"> <product>enterprise_server:12.4</product> </cve> <cve id="CVE-2016-1513" level="MEDIUM"> <product>openoffice:4.1.2</product> </cve> <cve id="CVE-2016-6501" level="LOW"> <product>artifactory:4.10</product> </cve> <cve id="CVE-2016-3127" level="LOW"> <product>good_control_server:2.2.511.26</product> </cve> <cve id="CVE-2016-4032" level="LOW"> <product>galaxy_note_3_firmware:n9005xxugbob6</product> <product>galaxy_s4_firmware:i9505xxuhoj2</product> <product>galaxy_s4_mini_firmware:i9192xxubnb1</product> <product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-6448" level="LOW"> <product>meeting_server:1.8.15</product> <product>meeting_server:1.8_base</product> <product>meeting_server:1.9.0</product> <product>meeting_server:1.9.2</product> <product>meeting_server:2.0.0</product> <product>meeting_server:2.0.1</product> <product>meeting_server:2.0.3</product> <product>meeting_server:2.0.4</product> <product>meeting_server:2.0.5</product> </cve> <cve id="CVE-2016-0528" level="LOW"> <product>e-business_suite:12.1.1</product> <product>e-business_suite:12.1.2</product> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-4031" level="LOW"> <product>galaxy_note_3_firmware:n9005xxugbob6</product> <product>galaxy_s4_firmware:i9505xxuhoj2</product> <product>galaxy_s4_mini_firmware:i9192xxubnb1</product> <product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-6449" level="LOW"> <product>fireamp_connector_endpoint_software:4.4.0</product> <product>fireamp_connector_endpoint_software:4.4.2.10200</product> </cve> <cve id="CVE-2016-4030" level="LOW"> <product>galaxy_note_3_firmware:n9005xxugbob6</product> <product>galaxy_s4_firmware:i9505xxuhoj2</product> <product>galaxy_s4_mini_firmware:i9192xxubnb1</product> <product>galaxy_s4_mini_lte_firmware:i9195xxucol1</product> <product>galaxy_s6_firmware:g920fxxu2coh2</product> </cve> <cve id="CVE-2016-6152" level="LOW"> <product>ehealth:6.2</product> <product>ehealth:6.2.1</product> <product>ehealth:6.2.2</product> <product>ehealth:6.3</product> <product>ehealth:6.3.1</product> <product>ehealth:6.3.2</product> <product>ehealth:6.3.2.01</product> <product>ehealth:6.3.2.02</product> <product>ehealth:6.3.2.03</product> <product>ehealth:6.3.2.04</product> <product>ehealth:6.3.2.05</product> <product>ehealth:6.3.2.06</product> <product>ehealth:6.3.2.07</product> <product>ehealth:6.3.2.08</product> <product>ehealth:6.3.2.09</product> <product>ehealth:6.3.2.10</product> <product>ehealth:6.3.2.11</product> <product>ehealth:6.3.2.12</product> </cve> <cve id="CVE-2016-6153" level="LOW"> <product>sqlite:3.12.2</product> <product>fedora:24</product> <product>leap:42.1</product> </cve> <cve id="CVE-2016-6150" level="LOW"> <product>hana:-</product> </cve> <cve id="CVE-2016-6151" level="LOW"> <product>ehealth:6.2</product> <product>ehealth:6.2.1</product> <product>ehealth:6.2.2</product> </cve> <cve id="CVE-2016-6558" level="LOW"> <product>ea-n66_firmware:-</product> <product>rp-ac52_firmware:1.0.1.1s</product> <product>rp-ac56_firmware:-</product> <product>rp-n12_firmware:-</product> <product>rp-n14_firmware:-</product> <product>rp-n53_firmware:-</product> <product>wmp-n12_firmware:-</product> </cve> <cve id="CVE-2016-3079" level="MEDIUM"> <product>network_satellite:5.7</product> <product>spacewalk-java:-</product> </cve> <cve id="CVE-2016-6552" level="LOW"> <product>dx-350_firmware:-</product> </cve> <cve id="CVE-2016-6553" level="LOW"> <product>nt-4040_titan_firmware:nt-4040_01.07.0000.0015_1120</product> </cve> <cve id="CVE-2016-6550" level="MEDIUM"> <product>the_u:1.5.4</product> </cve> <cve id="CVE-2016-6551" level="LOW"> <product>t100q_firmware:1.07</product> <product>t100w_firmware:1.07</product> <product>t110q_firmware:1.07</product> <product>t110w_firmware:1.07</product> <product>t130q_firmware:1.07</product> <product>t130w_firmware:1.07</product> <product>t240ck_firmware:1.07</product> <product>t80q_firmware:1.07</product> <product>t80w_firmware:1.07</product> <product>v60_firmware:1.07</product> <product>v60ka_firmware:1.07</product> <product>v65_firmware:1.07</product> <product>v80g_firmware:1.07</product> </cve> <cve id="CVE-2016-3076" level="MEDIUM"> <product>pillow:2.5.0</product> <product>pillow:2.5.1</product> <product>pillow:2.5.2</product> <product>pillow:2.5.3</product> <product>pillow:2.6.0</product> <product>pillow:2.6.0</product> <product>pillow:2.6.1</product> <product>pillow:2.6.2</product> <product>pillow:2.7.0</product> <product>pillow:2.8.0</product> <product>pillow:2.8.1</product> <product>pillow:2.8.2</product> <product>pillow:2.9.0</product> <product>pillow:2.9.0</product> <product>pillow:2.9.0</product> <product>pillow:2.9.0</product> <product>pillow:3.0.0</product> <product>pillow:3.0.0</product> <product>pillow:3.1.0</product> </cve> <cve id="CVE-2016-6557" level="MEDIUM"> <product>ea-n66_firmware:-</product> <product>rp-ac52_firmware:1.0.1.1s</product> <product>rp-ac56_firmware:-</product> <product>rp-n12_firmware:-</product> <product>rp-n14_firmware:-</product> <product>rp-n53_firmware:-</product> <product>wmp-n12_firmware:-</product> </cve> <cve id="CVE-2016-6554" level="LOW"> <product>ds107_firmware:3.1-1639</product> <product>ds116_firmware:5.2-5644-1</product> <product>ds213_firmware:5.2-5644-1</product> </cve> <cve id="CVE-2016-10010" level="MEDIUM"> <product>openssh:7.3</product> </cve> <cve id="CVE-2016-0525" level="LOW"> <product>universal_work_queue:11.5.10.2</product> <product>universal_work_queue:12.1.1</product> <product>universal_work_queue:12.1.2</product> <product>universal_work_queue:12.1.3</product> </cve> <cve id="CVE-2016-7204" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-0527" level="LOW"> <product>e-business_suite:12.1.1</product> <product>e-business_suite:12.1.2</product> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-0526" level="LOW"> <product>e-business_suite:11.5.10.2</product> <product>e-business_suite:12.1.3</product> <product>e-business_suite:12.2.3</product> <product>e-business_suite:12.2.4</product> <product>e-business_suite:12.2.5</product> </cve> <cve id="CVE-2016-7201" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-10013" level="LOW"> <product>xen:4.8.0</product> </cve> <cve id="CVE-2016-7203" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7202" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-10540" level="LOW"> <product>minimatch:3.0.1</product> </cve> <cve id="CVE-2016-7209" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7208" level="HIGH"> <product>edge</product> </cve> <cve id="CVE-2016-7979" level="LOW"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-7978" level="LOW"> <product>ghostscript:9.20</product> </cve> <cve id="CVE-2016-9746" level="MEDIUM"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> <product>rational_team_concert:4.0</product> <product>rational_team_concert:4.0.0</product> <product>rational_team_concert:4.0.0.1</product> <product>rational_team_concert:4.0.0.2</product> <product>rational_team_concert:4.0.1</product> <product>rational_team_concert:4.0.2</product> <product>rational_team_concert:4.0.3</product> <product>rational_team_concert:4.0.4</product> <product>rational_team_concert:4.0.5</product> <product>rational_team_concert:4.0.6</product> <product>rational_team_concert:4.0.7</product> <product>rational_team_concert:5.0</product> <product>rational_team_concert:5.0.0</product> <product>rational_team_concert:5.0.1</product> <product>rational_team_concert:5.0.2</product> <product>rational_team_concert:6.0</product> <product>rational_team_concert:6.0.0</product> <product>rational_team_concert:6.0.1</product> <product>rational_team_concert:6.0.2</product> <product>rational_team_concert:6.0.3</product> </cve> <cve id="CVE-2016-4950" level="LOW"> <product>manager:5.5.0</product> </cve> <cve id="CVE-2016-4959" level="LOW"> <product>gpu_driver:341.95</product> <product>gpu_driver:354.74</product> <product>gpu_driver:362.00</product> <product>gpu_driver:368.22</product> <product>gpu_driver:368.39</product> </cve> <cve id="CVE-2016-3696" level="LOW"> <product>pulp:2.8.4</product> <product>fedora:24</product> </cve> <cve id="CVE-2016-3697" level="LOW"> <product>docker:1.11.1</product> <product>runc:0.0.9</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-3694" level="LOW"> <product>ecommerce_shopsoftware:2.0.0.0</product> </cve> <cve id="CVE-2016-3693" level="MEDIUM"> <product>safemode:1.2.3</product> </cve> <cve id="CVE-2016-3690" level="LOW"> <product>jboss_enterprise_application_platform:4.2.0</product> <product>jboss_enterprise_application_platform:4.3.0</product> <product>jboss_enterprise_application_platform:5.0.0</product> <product>jboss_enterprise_application_platform:5.1.0</product> <product>jboss_enterprise_application_platform:5.1.1</product> <product>jboss_enterprise_application_platform:5.1.2</product> <product>jboss_enterprise_application_platform:5.2.0</product> </cve> <cve id="CVE-2016-3691" level="MEDIUM"> <product>kallithea:0.3.1</product> </cve> <cve id="CVE-2016-1126" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-4407" level="LOW"> <product>sapcryptolib:5.555.38</product> </cve> <cve id="CVE-2016-1124" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1125" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1122" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1123" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1120" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1121" level="LOW"> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>acrobat_xi:11.0.15</product> <product>reader_xi:11.0.15</product> </cve> <cve id="CVE-2016-1128" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-1129" level="LOW"> <product>acrobat:11.0.15</product> <product>acrobat_dc:15.006.30121</product> <product>acrobat_dc:15.010.20060</product> <product>acrobat_reader_dc:15.006.30121</product> <product>acrobat_reader_dc:15.010.20060</product> <product>reader:11.0.15</product> </cve> <cve id="CVE-2016-8514" level="LOW"> <product>version_control_repository_manager:-</product> <product>version_control_repository_manager:1.0.1288.1</product> <product>version_control_repository_manager:1.0.2241.0</product> <product>version_control_repository_manager:1.0.2289.0</product> <product>version_control_repository_manager:1.0.2345.0</product> <product>version_control_repository_manager:1.0.3085.0</product> <product>version_control_repository_manager:1.0.3086.0</product> <product>version_control_repository_manager:2.0.0.50</product> <product>version_control_repository_manager:2.0.1.30</product> <product>version_control_repository_manager:2.1.1.710</product> <product>version_control_repository_manager:2.1.1.720</product> <product>version_control_repository_manager:6.3.0.870</product> <product>version_control_repository_manager:7.4.0</product> </cve> <cve id="CVE-2016-8515" level="LOW"> <product>version_control_repository_manager:-</product> <product>version_control_repository_manager:1.0.1288.1</product> <product>version_control_repository_manager:1.0.2241.0</product> <product>version_control_repository_manager:1.0.2289.0</product> <product>version_control_repository_manager:1.0.2345.0</product> <product>version_control_repository_manager:1.0.3085.0</product> <product>version_control_repository_manager:1.0.3086.0</product> <product>version_control_repository_manager:2.0.0.50</product> <product>version_control_repository_manager:2.0.1.30</product> <product>version_control_repository_manager:2.1.1.710</product> <product>version_control_repository_manager:2.1.1.720</product> <product>version_control_repository_manager:6.3.0.870</product> <product>version_control_repository_manager:7.4.0</product> </cve> <cve id="CVE-2016-8516" level="LOW"> <product>systems_insight_manager:-</product> <product>systems_insight_manager:4.0</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:5.0</product> <product>systems_insight_manager:6.0</product> <product>systems_insight_manager:6.1</product> <product>systems_insight_manager:7.4</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-8517" level="MEDIUM"> <product>systems_insight_manager:-</product> <product>systems_insight_manager:4.0</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:5.0</product> <product>systems_insight_manager:6.0</product> <product>systems_insight_manager:6.1</product> <product>systems_insight_manager:7.4</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-8511" level="LOW"> <product>network_automation:9.10</product> <product>network_automation:9.20</product> <product>network_automation:9.22</product> <product>network_automation:9.22.01</product> <product>network_automation:9.22.02</product> <product>network_automation:10.00</product> <product>network_automation:10.00.01</product> <product>network_automation:10.00.02</product> <product>network_automation:10.10</product> <product>network_automation:10.11</product> <product>network_automation:10.11.01</product> <product>network_automation:10.20</product> </cve> <cve id="CVE-2016-8512" level="LOW"> <product>loadrunner:-</product> <product>performance_center:-</product> </cve> <cve id="CVE-2016-8513" level="MEDIUM"> <product>version_control_repository_manager:-</product> <product>version_control_repository_manager:1.0.1288.1</product> <product>version_control_repository_manager:1.0.2241.0</product> <product>version_control_repository_manager:1.0.2289.0</product> <product>version_control_repository_manager:1.0.2345.0</product> <product>version_control_repository_manager:1.0.3085.0</product> <product>version_control_repository_manager:1.0.3086.0</product> <product>version_control_repository_manager:2.0.0.50</product> <product>version_control_repository_manager:2.0.1.30</product> <product>version_control_repository_manager:2.1.1.710</product> <product>version_control_repository_manager:2.1.1.720</product> <product>version_control_repository_manager:6.3.0.870</product> <product>version_control_repository_manager:7.4.0</product> </cve> <cve id="CVE-2016-8518" level="LOW"> <product>systems_insight_manager:-</product> <product>systems_insight_manager:4.0</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.1</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:4.2</product> <product>systems_insight_manager:5.0</product> <product>systems_insight_manager:6.0</product> <product>systems_insight_manager:6.1</product> <product>systems_insight_manager:7.4</product> <product>systems_insight_manager:7.5</product> </cve> <cve id="CVE-2016-9740" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> <product>qradar_security_information_and_event_manager:7.2.7</product> <product>qradar_security_information_and_event_manager:7.2.8</product> </cve> <cve id="CVE-2016-9177" level="LOW"> <product>spark:2.5</product> </cve> <cve id="CVE-2016-9176" level="LOW"> <product>rumba:9.4.0</product> </cve> <cve id="CVE-2016-9179" level="LOW"> <product>lynx</product> </cve> <cve id="CVE-2016-1342" level="LOW"> <product>firepower_management_center:5.3.0.3</product> <product>firepower_management_center:5.3.1.3</product> <product>firepower_management_center:5.3.1.4</product> <product>firepower_management_center:5.3.1.5</product> <product>firepower_management_center:5.3.1.6</product> <product>firepower_management_center:5.3_base</product> <product>firepower_management_center:5.4.0</product> <product>firepower_management_center:5.4.1</product> <product>firepower_management_center:5.4.1.1</product> <product>firepower_management_center:5.4.1.2</product> <product>firepower_management_center:5.4.1.3</product> <product>firepower_management_center:5.4.1.4</product> <product>firepower_management_center:5.4.1.5</product> <product>firepower_management_center:5.4_base</product> <product>firepower_management_center:6.0.0</product> <product>firepower_management_center:6.0.0.1</product> <product>firepower_management_center:6.0_base</product> </cve> <cve id="CVE-2016-1343" level="LOW"> <product>information_server:6.2_base</product> </cve> <cve id="CVE-2016-1340" level="LOW"> <product>unified_computing_system_platform_emulator:2.5%282%29ts4</product> <product>unified_computing_system_platform_emulator:3.0%282c%29a</product> <product>unified_computing_system_platform_emulator:3.0%282c%29ts9</product> </cve> <cve id="CVE-2016-1341" level="MEDIUM"> <product>nx-os:7.0%281%29n1%281%29</product> <product>nx-os:7.0%281%29n1%283%29</product> <product>nx-os:7.0%284%29n1%281%29</product> </cve> <cve id="CVE-2016-1346" level="MEDIUM"> <product>telepresence_server_software:3.0%5c%282.24%5c%29</product> <product>telepresence_server_software:3.0%5c%282.46%5c%29</product> <product>telepresence_server_software:3.0%5c%282.48%5c%29</product> <product>telepresence_server_software:3.0%5c%282.49%5c%29</product> <product>telepresence_server_software:3.1%5c%281.80%5c%29</product> <product>telepresence_server_software:3.1%5c%281.82%5c%29</product> <product>telepresence_server_software:3.1%5c%281.95%5c%29</product> <product>telepresence_server_software:3.1%5c%281.96%5c%29</product> <product>telepresence_server_software:3.1%5c%281.97%5c%29</product> <product>telepresence_server_software:3.1%5c%281.98%5c%29</product> <product>telepresence_server_software:4.0%5c%281.57%5c%29</product> <product>telepresence_server_software:4.0%5c%282.8%5c%29</product> <product>telepresence_server_software:4.1%5c%281.40%5c%29</product> <product>telepresence_server_software:4.2%5c%284.17%5c%29</product> <product>telepresence_server_software:4.2%5c%284.18%5c%29</product> </cve> <cve id="CVE-2016-1345" level="LOW"> <product>asa_with_firepower_services:5.4.0</product> <product>asa_with_firepower_services:5.4.0.1</product> <product>asa_with_firepower_services:5.4.0.2</product> <product>asa_with_firepower_services:5.4.0.3</product> <product>asa_with_firepower_services:5.4.0.4</product> <product>asa_with_firepower_services:5.4.0.5</product> <product>asa_with_firepower_services:5.4.0.6</product> <product>asa_with_firepower_services:6.0.0</product> <product>asa_with_firepower_services:6.0.0.1</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> <product>firesight_system_software:5.4.0.4</product> <product>firesight_system_software:5.4.0.5</product> <product>firesight_system_software:5.4.0.6</product> <product>firesight_system_software:5.4.1</product> <product>firesight_system_software:5.4.1.2</product> <product>firesight_system_software:5.4.1.3</product> <product>firesight_system_software:5.4.1.4</product> <product>firesight_system_software:6.0.0</product> <product>firesight_system_software:6.0.0.1</product> <product>firesight_system_software:6.0.1</product> </cve> <cve id="CVE-2016-2803" level="MEDIUM"> <product>bugzilla:2.2</product> <product>bugzilla:2.4</product> <product>bugzilla:2.6</product> <product>bugzilla:2.8</product> <product>bugzilla:2.9</product> <product>bugzilla:2.16</product> <product>bugzilla:2.16</product> <product>bugzilla:2.16.1</product> <product>bugzilla:2.16.2</product> <product>bugzilla:2.16.3</product> <product>bugzilla:2.16.4</product> <product>bugzilla:2.16.5</product> <product>bugzilla:2.16.6</product> <product>bugzilla:2.16.7</product> <product>bugzilla:2.16.8</product> <product>bugzilla:2.16.9</product> <product>bugzilla:2.16.10</product> <product>bugzilla:2.16.11</product> <product>bugzilla:2.16_rc2</product> <product>bugzilla:2.17</product> <product>bugzilla:2.17.1</product> <product>bugzilla:2.17.2</product> <product>bugzilla:2.17.3</product> <product>bugzilla:2.17.4</product> <product>bugzilla:2.17.5</product> <product>bugzilla:2.17.6</product> <product>bugzilla:2.17.7</product> <product>bugzilla:2.18</product> <product>bugzilla:2.18</product> <product>bugzilla:2.18</product> <product>bugzilla:2.18</product> <product>bugzilla:2.18.1</product> <product>bugzilla:2.18.2</product> <product>bugzilla:2.18.3</product> <product>bugzilla:2.18.4</product> <product>bugzilla:2.18.5</product> <product>bugzilla:2.18.6</product> <product>bugzilla:2.18.6%2b</product> <product>bugzilla:2.18.7</product> <product>bugzilla:2.18.8</product> <product>bugzilla:2.18.9</product> <product>bugzilla:2.19</product> <product>bugzilla:2.19.1</product> <product>bugzilla:2.19.2</product> <product>bugzilla:2.19.3</product> <product>bugzilla:2.20</product> <product>bugzilla:2.20</product> <product>bugzilla:2.20</product> <product>bugzilla:2.20.1</product> <product>bugzilla:2.20.2</product> <product>bugzilla:2.20.3</product> <product>bugzilla:2.20.4</product> <product>bugzilla:2.20.5</product> <product>bugzilla:2.20.6</product> <product>bugzilla:2.20.7</product> <product>bugzilla:2.21</product> <product>bugzilla:2.21.1</product> <product>bugzilla:2.21.2</product> <product>bugzilla:2.21.2</product> <product>bugzilla:2.22</product> <product>bugzilla:2.22</product> <product>bugzilla:2.22.1</product> <product>bugzilla:2.22.2</product> <product>bugzilla:2.22.3</product> <product>bugzilla:2.22.4</product> <product>bugzilla:2.22.5</product> <product>bugzilla:2.22.6</product> <product>bugzilla:2.22.7</product> <product>bugzilla:2.23</product> <product>bugzilla:2.23.1</product> <product>bugzilla:2.23.2</product> <product>bugzilla:2.23.3</product> <product>bugzilla:2.23.4</product> <product>bugzilla:3.0</product> <product>bugzilla:3.0</product> <product>bugzilla:3.0.0</product> <product>bugzilla:3.0.1</product> <product>bugzilla:3.0.2</product> <product>bugzilla:3.0.3</product> <product>bugzilla:3.0.4</product> <product>bugzilla:3.0.5</product> <product>bugzilla:3.0.6</product> <product>bugzilla:3.0.7</product> <product>bugzilla:3.0.8</product> <product>bugzilla:3.0.9</product> <product>bugzilla:3.0.10</product> <product>bugzilla:3.0.11</product> <product>bugzilla:3.0_rc1</product> <product>bugzilla:3.1.0</product> <product>bugzilla:3.1.1</product> <product>bugzilla:3.1.2</product> <product>bugzilla:3.1.3</product> <product>bugzilla:3.1.4</product> <product>bugzilla:3.2</product> <product>bugzilla:3.2</product> <product>bugzilla:3.2</product> <product>bugzilla:3.2.1</product> <product>bugzilla:3.2.2</product> <product>bugzilla:3.2.3</product> <product>bugzilla:3.2.4</product> <product>bugzilla:3.2.5</product> <product>bugzilla:3.2.6</product> <product>bugzilla:3.2.7</product> <product>bugzilla:3.2.8</product> <product>bugzilla:3.2.9</product> <product>bugzilla:3.2.10</product> <product>bugzilla:3.3</product> <product>bugzilla:3.3.1</product> <product>bugzilla:3.3.2</product> <product>bugzilla:3.3.3</product> <product>bugzilla:3.3.4</product> <product>bugzilla:3.4</product> <product>bugzilla:3.4</product> <product>bugzilla:3.4.1</product> <product>bugzilla:3.4.2</product> <product>bugzilla:3.4.3</product> <product>bugzilla:3.4.4</product> <product>bugzilla:3.4.5</product> <product>bugzilla:3.4.6</product> <product>bugzilla:3.4.7</product> <product>bugzilla:3.4.8</product> <product>bugzilla:3.4.9</product> <product>bugzilla:3.4.10</product> <product>bugzilla:3.4.11</product> <product>bugzilla:3.4.12</product> <product>bugzilla:3.4.13</product> <product>bugzilla:3.4.14</product> <product>bugzilla:3.5</product> <product>bugzilla:3.5.1</product> <product>bugzilla:3.5.2</product> <product>bugzilla:3.5.3</product> <product>bugzilla:3.6</product> <product>bugzilla:3.6</product> <product>bugzilla:3.6.0</product> <product>bugzilla:3.6.1</product> <product>bugzilla:3.6.2</product> <product>bugzilla:3.6.3</product> <product>bugzilla:3.6.4</product> <product>bugzilla:3.6.5</product> <product>bugzilla:3.6.6</product> <product>bugzilla:3.6.7</product> <product>bugzilla:3.6.8</product> <product>bugzilla:3.6.9</product> <product>bugzilla:3.6.10</product> <product>bugzilla:3.6.11</product> <product>bugzilla:3.6.12</product> <product>bugzilla:3.6.13</product> <product>bugzilla:3.7</product> <product>bugzilla:3.7.1</product> <product>bugzilla:3.7.2</product> <product>bugzilla:3.7.3</product> <product>bugzilla:4.0</product> <product>bugzilla:4.0</product> <product>bugzilla:4.0</product> <product>bugzilla:4.0.1</product> <product>bugzilla:4.0.2</product> <product>bugzilla:4.0.3</product> <product>bugzilla:4.0.4</product> <product>bugzilla:4.0.5</product> <product>bugzilla:4.0.6</product> <product>bugzilla:4.0.7</product> <product>bugzilla:4.0.8</product> <product>bugzilla:4.0.9</product> <product>bugzilla:4.0.10</product> <product>bugzilla:4.0.11</product> <product>bugzilla:4.0.12</product> <product>bugzilla:4.0.13</product> <product>bugzilla:4.0.14</product> <product>bugzilla:4.0.15</product> <product>bugzilla:4.0.16</product> <product>bugzilla:4.0.17</product> <product>bugzilla:4.0.18</product> <product>bugzilla:4.1</product> <product>bugzilla:4.1.1</product> <product>bugzilla:4.1.2</product> <product>bugzilla:4.1.3</product> <product>bugzilla:4.2</product> <product>bugzilla:4.2</product> <product>bugzilla:4.2</product> <product>bugzilla:4.2.1</product> <product>bugzilla:4.2.2</product> <product>bugzilla:4.2.3</product> <product>bugzilla:4.2.4</product> <product>bugzilla:4.2.5</product> <product>bugzilla:4.2.6</product> <product>bugzilla:4.2.7</product> <product>bugzilla:4.2.8</product> <product>bugzilla:4.2.9</product> <product>bugzilla:4.2.10</product> <product>bugzilla:4.2.11</product> <product>bugzilla:4.2.12</product> <product>bugzilla:4.2.13</product> <product>bugzilla:4.2.14</product> <product>bugzilla:4.2.15</product> <product>bugzilla:4.3</product> <product>bugzilla:4.3.1</product> <product>bugzilla:4.3.2</product> <product>bugzilla:4.3.3</product> <product>bugzilla:4.4</product> <product>bugzilla:4.4</product> <product>bugzilla:4.4</product> <product>bugzilla:4.4.1</product> <product>bugzilla:4.4.2</product> <product>bugzilla:4.4.3</product> <product>bugzilla:4.4.4</product> <product>bugzilla:4.4.5</product> <product>bugzilla:4.4.6</product> <product>bugzilla:4.4.7</product> <product>bugzilla:4.4.8</product> <product>bugzilla:4.4.9</product> <product>bugzilla:4.4.10</product> <product>bugzilla:4.4.11</product> <product>bugzilla:4.5.1</product> <product>bugzilla:4.5.2</product> <product>bugzilla:4.5.3</product> <product>bugzilla:4.5.4</product> <product>bugzilla:4.5.5</product> <product>bugzilla:4.5.6</product> <product>bugzilla:5.0</product> <product>bugzilla:5.0</product> <product>bugzilla:5.0</product> <product>bugzilla:5.0</product> <product>bugzilla:5.0.1</product> <product>bugzilla:5.0.2</product> </cve> <cve id="CVE-2016-5468" level="LOW"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> <product>siebel_ui_framework:2014</product> <product>siebel_ui_framework:2015</product> <product>siebel_ui_framework:2016</product> </cve> <cve id="CVE-2016-5467" level="LOW"> <product>peoplesoft_enterprise_scm_eprocurement:9.1</product> <product>peoplesoft_enterprise_scm_eprocurement:9.2</product> </cve> <cve id="CVE-2016-5466" level="MEDIUM"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-5465" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-5464" level="MEDIUM"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> <product>siebel_ui_framework:2014</product> <product>siebel_ui_framework:2015</product> <product>siebel_ui_framework:2016</product> </cve> <cve id="CVE-2016-5463" level="MEDIUM"> <product>siebel_ui_framework:8.1.1</product> <product>siebel_ui_framework:8.2.2</product> <product>siebel_ui_framework:2014</product> <product>siebel_ui_framework:2015</product> <product>siebel_ui_framework:2016</product> </cve> <cve id="CVE-2016-5462" level="LOW"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-5461" level="LOW"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-5460" level="MEDIUM"> <product>siebel_core-server_framework:8.1.1</product> <product>siebel_core-server_framework:8.2.2</product> <product>siebel_core-server_framework:2014</product> <product>siebel_core-server_framework:2015</product> <product>siebel_core-server_framework:2016</product> </cve> <cve id="CVE-2016-10661" level="MEDIUM"> <product>phantomjs-cheniu:-</product> </cve> <cve id="CVE-2016-3443" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-3442" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-6961" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6960" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3447" level="HIGH"> <product>applications_framework:12.1.3</product> <product>applications_framework:12.2.3</product> <product>applications_framework:12.2.4</product> <product>applications_framework:12.2.5</product> </cve> <cve id="CVE-2016-3446" level="LOW"> <product>business_intelligence:11.1.1.7.0</product> <product>business_intelligence:11.1.1.9.0</product> </cve> <cve id="CVE-2016-6965" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-3444" level="LOW"> <product>retail_integration_bus:13.0</product> <product>retail_integration_bus:13.1</product> <product>retail_integration_bus:13.2</product> <product>retail_integration_bus:14.0</product> <product>retail_integration_bus:14.1</product> <product>retail_integration_bus:15.0</product> </cve> <cve id="CVE-2016-3199" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-3198" level="MEDIUM"> <product>edge:-</product> </cve> <cve id="CVE-2016-6969" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-6968" level="LOW"> <product>acrobat:11.0.17</product> <product>acrobat_dc:15.006.30201</product> <product>acrobat_dc:15.017.20053</product> <product>acrobat_reader_dc:15.006.30201</product> <product>acrobat_reader_dc:15.017.20053</product> <product>reader:11.0.17</product> </cve> <cve id="CVE-2016-7568" level="LOW"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-7569" level="MEDIUM"> <product>docker2aci:0.12.3</product> </cve> <cve id="CVE-2016-7564" level="LOW"> <product>mujs:-</product> </cve> <cve id="CVE-2016-7565" level="LOW"> <product>exponent_cms:2.3.9</product> </cve> <cve id="CVE-2016-7567" level="LOW"> <product>openslp:2.0</product> </cve> <cve id="CVE-2016-7560" level="LOW"> <product>fortiwlc:6.1-2-29</product> <product>fortiwlc:7.0-9-1</product> <product>fortiwlc:7.0-10-0</product> <product>fortiwlc:8.0-5-0</product> <product>fortiwlc:8.1-2-0</product> <product>fortiwlc:8.2-4-0</product> </cve> <cve id="CVE-2016-7561" level="LOW"> <product>fortiwlc:6.1-2-29</product> <product>fortiwlc:7.0-9-1</product> <product>fortiwlc:7.0-10-0</product> <product>fortiwlc:8.0-5-0</product> <product>fortiwlc:8.1-2-0</product> <product>fortiwlc:8.2-4-0</product> </cve> <cve id="CVE-2016-7563" level="LOW"> <product>mujs:-</product> </cve> <cve id="CVE-2016-8669" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-3999" level="MEDIUM"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-3998" level="HIGH"> <product>altavault:4.1</product> </cve> <cve id="CVE-2016-6619" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6618" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-3991" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> </cve> <cve id="CVE-2016-3990" level="MEDIUM"> <product>libtiff:4.0.6</product> <product>vm_server:3.3</product> <product>vm_server:3.4</product> </cve> <cve id="CVE-2016-6617" level="MEDIUM"> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6616" level="MEDIUM"> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6611" level="HIGH"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6610" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-3997" level="MEDIUM"> <product>clustered_data_ontap:8.3.1</product> </cve> <cve id="CVE-2016-3996" level="MEDIUM"> <product>knox:1.0</product> <product>knox:2.3.0</product> </cve> <cve id="CVE-2016-4378" level="LOW"> <product>xp7_command_view:8.4.0</product> <product>xp_9000_command_view:8.4.0</product> </cve> <cve id="CVE-2016-8792" level="HIGH"> <product>mate_8_firmware:-</product> <product>mate_s_firmware:-</product> <product>p8_firmware:-</product> </cve> <cve id="CVE-2016-1256" level="LOW"> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x44</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x46</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.1x47</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3</product> <product>junos:12.3x48</product> <product>junos:12.3x48</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.2x51</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:13.3</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x53</product> <product>junos:14.1x55</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:14.2</product> <product>junos:15.1</product> </cve> <cve id="CVE-2016-4377" level="HIGH"> <product>converged_infrastructure_solution_sizer_suite:2.13.0</product> <product>insight_management_sizer:16.12.0</product> <product>power_advisor:7.8.1</product> <product>sap_sizing_tool:16.12.0</product> <product>sizer_for_converged_systems_virtualization:16.7.0</product> <product>sizer_for_microsoft_exchange_server_2010:16.12.0</product> <product>sizer_for_microsoft_exchange_server_2013:16.12.0</product> <product>sizer_for_microsoft_exchange_server_2016:16.12.0</product> <product>sizer_for_microsoft_lync_server_2013:16.12.0</product> <product>sizer_for_microsoft_sharepoint_2010:16.11.0</product> <product>sizer_for_microsoft_sharepoint_2013:16.13.0</product> <product>sizer_for_microsoft_skype_for_business_server_2015:16.5.0</product> <product>sizing_tool_for_sap_business_suite_powered_by_hana:16.11.0</product> <product>storage_sizing_tool:13.0</product> <product>synergy_planning_tool:3.2</product> </cve> <cve id="CVE-2016-1251" level="MEDIUM"> <product>dbd-mysql:3.0000_0</product> <product>dbd-mysql:3.0001_1</product> <product>dbd-mysql:3.0001_2</product> <product>dbd-mysql:3.0001_3</product> <product>dbd-mysql:3.0002_1</product> <product>dbd-mysql:3.0002_2</product> <product>dbd-mysql:3.0002_3</product> <product>dbd-mysql:3.0002_4</product> <product>dbd-mysql:3.0002_5</product> <product>dbd-mysql:3.0003_1</product> <product>dbd-mysql:3.0004_1</product> <product>dbd-mysql:3.0005</product> <product>dbd-mysql:3.0005_1</product> <product>dbd-mysql:3.0007_2</product> <product>dbd-mysql:3.0008_1</product> <product>dbd-mysql:3.0009_1</product> <product>dbd-mysql:4.00</product> <product>dbd-mysql:4.001</product> <product>dbd-mysql:4.002</product> <product>dbd-mysql:4.003</product> <product>dbd-mysql:4.004</product> <product>dbd-mysql:4.005</product> <product>dbd-mysql:4.006</product> <product>dbd-mysql:4.007</product> <product>dbd-mysql:4.008</product> <product>dbd-mysql:4.009</product> <product>dbd-mysql:4.010</product> <product>dbd-mysql:4.011</product> <product>dbd-mysql:4.012</product> <product>dbd-mysql:4.013</product> <product>dbd-mysql:4.014</product> <product>dbd-mysql:4.015</product> <product>dbd-mysql:4.016</product> <product>dbd-mysql:4.017</product> <product>dbd-mysql:4.018</product> <product>dbd-mysql:4.019</product> <product>dbd-mysql:4.020</product> <product>dbd-mysql:4.021</product> <product>dbd-mysql:4.022</product> <product>dbd-mysql:4.023</product> <product>dbd-mysql:4.024</product> <product>dbd-mysql:4.025</product> <product>dbd-mysql:4.026</product> <product>dbd-mysql:4.027</product> <product>dbd-mysql:4.028</product> <product>dbd-mysql:4.029</product> <product>dbd-mysql:4.030_01</product> <product>dbd-mysql:4.030_02</product> <product>dbd-mysql:4.031</product> <product>dbd-mysql:4.032</product> <product>dbd-mysql:4.032_01</product> <product>dbd-mysql:4.032_02</product> <product>dbd-mysql:4.032_03</product> <product>dbd-mysql:4.033</product> <product>dbd-mysql:4.033_01</product> <product>dbd-mysql:4.033_02</product> <product>dbd-mysql:4.033_03</product> <product>dbd-mysql:4.034</product> <product>dbd-mysql:4.035</product> <product>dbd-mysql:4.035_01</product> <product>dbd-mysql:4.035_02</product> <product>dbd-mysql:4.035_03</product> <product>dbd-mysql:4.036</product> <product>dbd-mysql:4.037</product> <product>dbd-mysql:4.037_01</product> <product>dbd-mysql:4.038</product> <product>dbd-mysql:4.038_01</product> <product>dbd-mysql:4.039</product> <product>dbd-mysql:4.040</product> </cve> <cve id="CVE-2016-4372" level="LOW"> <product>intelligent_management_center_application_performance_manager:7.2</product> <product>your_sha256_hashem:7.2</product> <product>intelligent_management_center_endpoint_admission_defense:7.2</product> <product>intelligent_management_center_network_traffic_analyzer:7.2</product> <product>intelligent_management_center_platform:7.2</product> <product>intelligent_management_center_user_access_management:7.2</product> </cve> <cve id="CVE-2016-0300" level="LOW"> <product>tririga_application_platform:3.3.0.0</product> <product>tririga_application_platform:3.3.0.1</product> <product>tririga_application_platform:3.3.0.2</product> <product>tririga_application_platform:3.3.1.0</product> <product>tririga_application_platform:3.3.1.1</product> <product>tririga_application_platform:3.3.1.2</product> <product>tririga_application_platform:3.3.1.3</product> <product>tririga_application_platform:3.3.2.0</product> <product>tririga_application_platform:3.3.2.1</product> <product>tririga_application_platform:3.3.2.3</product> <product>tririga_application_platform:3.3.2.4</product> <product>tririga_application_platform:3.3.2.5</product> <product>tririga_application_platform:3.4.0.0</product> <product>tririga_application_platform:3.4.1.1</product> <product>tririga_application_platform:3.4.1.2</product> <product>tririga_application_platform:3.4.1.3</product> <product>tririga_application_platform:3.4.2.0</product> <product>tririga_application_platform:3.4.2.1</product> <product>tririga_application_platform:3.4.2.2</product> <product>tririga_application_platform:3.5.0.0</product> </cve> <cve id="CVE-2016-3429" level="MEDIUM"> <product>retail_xstore_point_of_service:5.0</product> <product>retail_xstore_point_of_service:5.5</product> <product>retail_xstore_point_of_service:6.0</product> <product>retail_xstore_point_of_service:6.5</product> <product>retail_xstore_point_of_service:7.0</product> <product>retail_xstore_point_of_service:7.1</product> </cve> <cve id="CVE-2016-3428" level="HIGH"> <product>agile_engineering_data_management:6.1.3.0</product> <product>agile_engineering_data_management:6.2.0.0</product> </cve> <cve id="CVE-2016-5124" level="MEDIUM"> <product>open-xchange_appsuite:7.8.1</product> </cve> <cve id="CVE-2016-0756" level="LOW"> <product>prosody:0.9.9</product> </cve> <cve id="CVE-2016-0757" level="LOW"> <product>image_registry_and_delivery_service_%28glance%29:11.0.0</product> <product>image_registry_and_delivery_service_%28glance%29:11.0.1</product> <product>image_registry_and_delivery_service_%28glance%29:2015.1.2</product> </cve> <cve id="CVE-2016-0754" level="LOW"> <product>curl:7.46.0</product> </cve> <cve id="CVE-2016-0752" level="LOW"> <product>ruby_on_rails:3.2.22</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.2</product> <product>ruby_on_rails:4.0.3</product> <product>ruby_on_rails:4.0.4</product> <product>ruby_on_rails:4.0.5</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.7</product> <product>ruby_on_rails:4.0.8</product> <product>ruby_on_rails:4.0.9</product> <product>ruby_on_rails:4.0.10</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.1</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.3</product> <product>ruby_on_rails:4.1.4</product> <product>ruby_on_rails:4.1.5</product> <product>ruby_on_rails:4.1.6</product> <product>ruby_on_rails:4.1.7</product> <product>ruby_on_rails:4.1.8</product> <product>ruby_on_rails:4.1.9</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.11</product> <product>ruby_on_rails:4.1.12</product> <product>ruby_on_rails:4.1.13</product> <product>ruby_on_rails:4.1.14</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.2</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:5.0.0</product> </cve> <cve id="CVE-2016-0753" level="LOW"> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.1</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.3</product> <product>ruby_on_rails:4.1.4</product> <product>ruby_on_rails:4.1.5</product> <product>ruby_on_rails:4.1.6</product> <product>ruby_on_rails:4.1.7</product> <product>ruby_on_rails:4.1.8</product> <product>ruby_on_rails:4.1.9</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.11</product> <product>ruby_on_rails:4.1.12</product> <product>ruby_on_rails:4.1.13</product> <product>ruby_on_rails:4.1.14</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.2</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:5.0.0</product> </cve> <cve id="CVE-2016-0751" level="LOW"> <product>ruby_on_rails:3.2.22</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.0</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.1</product> <product>ruby_on_rails:4.0.2</product> <product>ruby_on_rails:4.0.3</product> <product>ruby_on_rails:4.0.4</product> <product>ruby_on_rails:4.0.5</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.6</product> <product>ruby_on_rails:4.0.7</product> <product>ruby_on_rails:4.0.8</product> <product>ruby_on_rails:4.0.9</product> <product>ruby_on_rails:4.0.10</product> <product>ruby_on_rails:4.0.10</product> <product>ruby_on_rails:4.0.10</product> <product>ruby_on_rails:4.0.11</product> <product>ruby_on_rails:4.0.11.1</product> <product>ruby_on_rails:4.0.12</product> <product>ruby_on_rails:4.0.13</product> <product>ruby_on_rails:4.0.13</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.0</product> <product>ruby_on_rails:4.1.1</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.2</product> <product>ruby_on_rails:4.1.3</product> <product>ruby_on_rails:4.1.4</product> <product>ruby_on_rails:4.1.5</product> <product>ruby_on_rails:4.1.6</product> <product>ruby_on_rails:4.1.7</product> <product>ruby_on_rails:4.1.8</product> <product>ruby_on_rails:4.1.9</product> <product>ruby_on_rails:4.1.10</product> <product>ruby_on_rails:4.1.11</product> <product>ruby_on_rails:4.1.12</product> <product>ruby_on_rails:4.1.13</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.0</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.1</product> <product>ruby_on_rails:4.2.2</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.3</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.4</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:4.2.5</product> <product>ruby_on_rails:5.0.0</product> </cve> <cve id="CVE-2016-9348" level="LOW"> <product>nport_5600-8-dtl_series_firmware:2.3</product> <product>nport_5100_series_firmware:2.5</product> <product>nport_5100_series_firmware:3.5</product> <product>nport_5100a_series_firmware:1.2</product> <product>nport_5200_series_firmware:2.7</product> <product>nport_5200a_series_firmware:1.2</product> <product>nport_5400_series_firmware:3.10</product> <product>nport_5600_series_firmware:3.6</product> <product>nport_5x50a1-m12_series_firmware:1.1</product> <product>nport_6100_series_firmware:1.13</product> <product>nport_p5150a_series_firmware:1.2</product> </cve> <cve id="CVE-2016-9349" level="LOW"> <product>susiaccess:3.0</product> </cve> <cve id="CVE-2016-9343" level="LOW"> <product>1768_compact_guardlogix_l4xs_controller_firmware:18.00</product> <product>1768_compact_guardlogix_l4xs_controller_firmware:19.00</product> <product>1768_compact_guardlogix_l4xs_controller_firmware:20.00</product> <product>1768_compact_guardlogix_l4xs_controller_firmware:20.011</product> <product>1768_compact_guardlogix_l4xs_controller_firmware:20.013</product> <product>1768_compactlogix_l4x_controller_firmware:16.00</product> <product>1768_compactlogix_l4x_controller_firmware:16.020</product> <product>1768_compactlogix_l4x_controller_firmware:16.025</product> <product>1768_compactlogix_l4x_controller_firmware:17.00</product> <product>1768_compactlogix_l4x_controller_firmware:18.00</product> <product>1768_compactlogix_l4x_controller_firmware:19.00</product> <product>1768_compactlogix_l4x_controller_firmware:20.00</product> <product>1768_compactlogix_l4x_controller_firmware:20.011</product> <product>1768_compactlogix_l4x_controller_firmware:20.016</product> <product>1769_compactlogix_5370_l1_controller_firmware:20.00</product> <product>1769_compactlogix_5370_l1_controller_firmware:20.010</product> <product>1769_compactlogix_5370_l1_controller_firmware:20.013</product> <product>1769_compactlogix_5370_l1_controller_firmware:21.00</product> <product>1769_compactlogix_5370_l2_controller_firmware:20.00</product> <product>1769_compactlogix_5370_l2_controller_firmware:20.010</product> <product>1769_compactlogix_5370_l2_controller_firmware:20.013</product> <product>1769_compactlogix_5370_l2_controller_firmware:21.00</product> <product>1769_compactlogix_5370_l3_controller_firmware:20.00</product> <product>1769_compactlogix_5370_l3_controller_firmware:20.010</product> <product>1769_compactlogix_5370_l3_controller_firmware:20.013</product> <product>1769_compactlogix_5370_l3_controller_firmware:21.00</product> <product>1769_compactlogix_l23x_controller_firmware:16.00</product> <product>1769_compactlogix_l23x_controller_firmware:17.00</product> <product>1769_compactlogix_l23x_controller_firmware:18.00</product> <product>1769_compactlogix_l23x_controller_firmware:19.00</product> <product>1769_compactlogix_l23x_controller_firmware:20.00</product> <product>1769_compactlogix_l23x_controller_firmware:20.010</product> <product>1769_compactlogix_l23x_controller_firmware:20.013</product> <product>1769_compactlogix_l3x_controller_firmware:16.00</product> <product>1769_compactlogix_l3x_controller_firmware:16.020</product> <product>1769_compactlogix_l3x_controller_firmware:16.023</product> <product>1769_compactlogix_l3x_controller_firmware:17.00</product> <product>1769_compactlogix_l3x_controller_firmware:18.00</product> <product>1769_compactlogix_l3x_controller_firmware:19.00</product> <product>1769_compactlogix_l3x_controller_firmware:20.00</product> <product>1769_compactlogix_l3x_controller_firmware:20.010</product> <product>1769_compactlogix_l3x_controller_firmware:20.013</product> <product>controllogix_5560_controller_firmware:16.00</product> <product>controllogix_5560_controller_firmware:16.020</product> <product>controllogix_5560_controller_firmware:16.022</product> <product>controllogix_5560_controller_firmware:17.00</product> <product>controllogix_5560_controller_firmware:18.00</product> <product>controllogix_5560_controller_firmware:19.00</product> <product>controllogix_5560_controller_firmware:20.00</product> <product>controllogix_5560_controller_firmware:20.010</product> <product>controllogix_5560_controller_firmware:20.013</product> <product>controllogix_5560_redundant_controller_firmware:16.00</product> <product>controllogix_5560_redundant_controller_firmware:19.00</product> <product>controllogix_5560_redundant_controller_firmware:20.00</product> <product>controllogix_5560_redundant_controller_firmware:20.050</product> <product>controllogix_5560_redundant_controller_firmware:20.055</product> <product>controllogix_5570_controller_firmware:18.00</product> <product>controllogix_5570_controller_firmware:19.00</product> <product>controllogix_5570_controller_firmware:20.010</product> <product>controllogix_5570_controller_firmware:20.013</product> <product>controllogix_5570_controller_firmware:21.00</product> <product>controllogix_5570_redundant_controller_firmware:20.00</product> <product>controllogix_5570_redundant_controller_firmware:20.050</product> <product>controllogix_5570_redundant_controller_firmware:20.055</product> <product>controllogix_5570_redundant_controller_firmware:21.00</product> <product>controllogix_l55_controller_firmware:16.00</product> <product>controllogix_l55_controller_firmware:16.020</product> <product>controllogix_l55_controller_firmware:16.022</product> <product>flexlogix_l34_controller_firmware:16.00</product> <product>guardlogix_5570_controller_firmware:16.00</product> <product>guardlogix_5570_controller_firmware:17.00</product> <product>guardlogix_5570_controller_firmware:18.00</product> <product>guardlogix_5570_controller_firmware:19.00</product> <product>guardlogix_5570_controller_firmware:20.00</product> <product>guardlogix_5570_controller_firmware:20.010</product> <product>guardlogix_5570_controller_firmware:20.017</product> <product>guardlogix_5570_controller_firmware:21.00</product> <product>rslogix_emulate_5000_firmware:18.00</product> <product>rslogix_emulate_5000_firmware:19.00</product> <product>rslogix_emulate_5000_firmware:20.00</product> <product>rslogix_emulate_5000_firmware:21.00</product> <product>softlogix_5800_controller_firmware:18.00</product> <product>softlogix_5800_controller_firmware:19.00</product> <product>softlogix_5800_controller_firmware:20.00</product> <product>softlogix_5800_controller_firmware:21.00</product> </cve> <cve id="CVE-2016-9346" level="LOW"> <product>miineport_e1_firmware:1.7</product> <product>miineport_e2_firmware:1.3</product> <product>miineport_e3_firmware:1.0</product> </cve> <cve id="CVE-2016-9347" level="MEDIUM"> <product>se4801t0x_redundant_wireless_i%2fo_card_firmware:13.3</product> <product>se4801t1x_simplex_wireless_i%2fo_card_firmware:13.3</product> </cve> <cve id="CVE-2016-9344" level="LOW"> <product>miineport_e1_firmware:1.7</product> <product>miineport_e2_firmware:1.3</product> <product>miineport_e3_firmware:1.0</product> </cve> <cve id="CVE-2016-9345" level="MEDIUM"> <product>deltav:12.3</product> <product>deltav:12.3.1</product> <product>deltav:13.3</product> </cve> <cve id="CVE-2016-1597" level="LOW"> <product>access_governance_suite:6.0</product> <product>access_governance_suite:6.1</product> <product>access_governance_suite:6.2</product> <product>access_governance_suite:6.3</product> <product>access_governance_suite:6.4</product> </cve> <cve id="CVE-2016-1596" level="MEDIUM"> <product>service_desk:7.1</product> </cve> <cve id="CVE-2016-1595" level="LOW"> <product>service_desk:7.1</product> </cve> <cve id="CVE-2016-1594" level="LOW"> <product>service_desk:7.1</product> </cve> <cve id="CVE-2016-1593" level="LOW"> <product>service_desk:7.1</product> </cve> <cve id="CVE-2016-1592" level="MEDIUM"> <product>identity_manager:4.5.2</product> </cve> <cve id="CVE-2016-3420" level="HIGH"> <product>agile_product_lifecycle_management_framework:9.3.1.1</product> <product>agile_product_lifecycle_management_framework:9.3.1.2</product> <product>agile_product_lifecycle_management_framework:9.3.2</product> <product>agile_product_lifecycle_management_framework:9.3.3</product> </cve> <cve id="CVE-2016-3423" level="MEDIUM"> <product>peoplesoft_enterprise_peopletools:8.53</product> <product>peoplesoft_enterprise_peopletools:8.54</product> <product>peoplesoft_enterprise_peopletools:8.55</product> </cve> <cve id="CVE-2016-1599" level="MEDIUM"> <product>self_service_password_reset:2.0</product> <product>self_service_password_reset:3.0</product> <product>self_service_password_reset:3.1</product> <product>self_service_password_reset:3.2</product> <product>self_service_password_reset:3.3</product> <product>self_service_password_reset:3.3.1</product> </cve> <cve id="CVE-2016-1598" level="MEDIUM"> <product>identity_manager:4.5</product> <product>identity_manager_identity_applications:4.5.3</product> </cve> <cve id="CVE-2016-5874" level="LOW"> <product>simatic_net_pc-software:13</product> </cve> <cve id="CVE-2016-5876" level="MEDIUM"> <product>owncloud:8.2.5</product> <product>owncloud:9.0.0</product> <product>owncloud:9.0.1</product> <product>owncloud:9.0.2</product> </cve> <cve id="CVE-2016-3422" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-5873" level="LOW"> <product>pecl_http:3.0.1</product> </cve> <cve id="CVE-2016-5699" level="MEDIUM"> <product>python:2.7.9</product> <product>python:3.0</product> <product>python:3.0.1</product> <product>python:3.1.0</product> <product>python:3.1.1</product> <product>python:3.1.2</product> <product>python:3.1.3</product> <product>python:3.1.4</product> <product>python:3.1.5</product> <product>python:3.2.0</product> <product>python:3.2.1</product> <product>python:3.2.2</product> <product>python:3.2.3</product> <product>python:3.2.4</product> <product>python:3.2.5</product> <product>python:3.2.6</product> <product>python:3.3.0</product> <product>python:3.3.1</product> <product>python:3.3.2</product> <product>python:3.3.3</product> <product>python:3.3.4</product> <product>python:3.3.5</product> <product>python:3.3.6</product> <product>python:3.4.0</product> <product>python:3.4.1</product> <product>python:3.4.2</product> <product>python:3.4.3</product> </cve> <cve id="CVE-2016-5878" level="MEDIUM"> <product>filenet_workplace:4.0.2.0</product> <product>filenet_workplace:4.0.2.1</product> <product>filenet_workplace:4.0.2.2</product> <product>filenet_workplace:4.0.2.3</product> <product>filenet_workplace:4.0.2.4</product> <product>filenet_workplace:4.0.2.5</product> <product>filenet_workplace:4.0.2.6</product> <product>filenet_workplace:4.0.2.7</product> <product>filenet_workplace:4.0.2.8</product> <product>filenet_workplace:4.0.2.9</product> <product>filenet_workplace:4.0.2.10</product> <product>filenet_workplace:4.0.2.11</product> <product>filenet_workplace:4.0.2.12</product> <product>filenet_workplace:4.0.2.13</product> </cve> <cve id="CVE-2016-5879" level="LOW"> <product>mq_appliance_firmware:8.0</product> </cve> <cve id="CVE-2016-3426" level="MEDIUM"> <product>jdk:1.8.0</product> <product>jre:1.8.0</product> </cve> <cve id="CVE-2016-9933" level="LOW"> <product>libgd:2.2.1</product> </cve> <cve id="CVE-2016-9932" level="LOW"> <product>xen:3.3.0</product> <product>xen:3.3.1</product> <product>xen:3.3.2</product> <product>xen:3.4.0</product> <product>xen:3.4.1</product> <product>xen:3.4.2</product> <product>xen:3.4.3</product> <product>xen:3.4.4</product> <product>xen:4.0.0</product> <product>xen:4.0.1</product> <product>xen:4.0.2</product> <product>xen:4.0.3</product> <product>xen:4.0.4</product> <product>xen:4.1.0</product> <product>xen:4.1.1</product> <product>xen:4.1.2</product> <product>xen:4.1.3</product> <product>xen:4.1.4</product> <product>xen:4.1.5</product> <product>xen:4.1.6</product> <product>xen:4.1.6.1</product> <product>xen:4.2.0</product> <product>xen:4.2.1</product> <product>xen:4.2.2</product> <product>xen:4.2.3</product> <product>xen:4.2.4</product> <product>xen:4.2.5</product> <product>xen:4.3.0</product> <product>xen:4.3.1</product> <product>xen:4.3.2</product> <product>xen:4.3.3</product> <product>xen:4.3.4</product> <product>xen:4.4.0</product> <product>xen:4.4.1</product> <product>xen:4.4.2</product> <product>xen:4.4.3</product> <product>xen:4.4.4</product> <product>xen:4.5.0</product> <product>xen:4.5.1</product> <product>xen:4.5.2</product> <product>xen:4.5.3</product> <product>xen:4.5.5</product> <product>xen:4.6.0</product> <product>xen:4.6.3</product> <product>xen:4.7.0</product> </cve> <cve id="CVE-2016-10327" level="LOW"> <product>libreoffice:5.3.0.0</product> </cve> <cve id="CVE-2016-10326" level="LOW"> <product>osip:4.1.0</product> </cve> <cve id="CVE-2016-10325" level="LOW"> <product>osip:4.1.0</product> </cve> <cve id="CVE-2016-10324" level="LOW"> <product>osip:4.1.0</product> </cve> <cve id="CVE-2016-10323" level="LOW"> <product>photo_station:6.0-2638</product> <product>photo_station:6.0-2639</product> <product>photo_station:6.0-2640</product> <product>photo_station:6.3</product> <product>photo_station:6.3-2944</product> </cve> <cve id="CVE-2016-10322" level="LOW"> <product>photo_station:6.3-2954</product> </cve> <cve id="CVE-2016-10321" level="LOW"> <product>web2py:2.14.5</product> </cve> <cve id="CVE-2016-10320" level="MEDIUM"> <product>textract:1.4.0</product> </cve> <cve id="CVE-2016-10329" level="LOW"> <product>photo_station:6.5.2-3225</product> </cve> <cve id="CVE-2016-10328" level="LOW"> <product>freetype2:2.7</product> </cve> <cve id="CVE-2016-4610" level="LOW"> <product>libxslt</product> </cve> <cve id="CVE-2016-4616" level="LOW"> <product>libxml2:-</product> </cve> <cve id="CVE-2016-4615" level="LOW"> <product>libxml2:-</product> </cve> <cve id="CVE-2016-4614" level="LOW"> <product>libxml2:-</product> </cve> <cve id="CVE-2016-7509" level="MEDIUM"> <product>glpi:0.90.4</product> </cve> <cve id="CVE-2016-8798" level="LOW"> <product>usg5500_firmware:v300r001c00</product> <product>usg5500_firmware:v300r001c10</product> </cve> <cve id="CVE-2016-3675" level="LOW"> <product>policy_center_firmware:v100r003c00</product> <product>policy_center_firmware:v100r003c10</product> </cve> <cve id="CVE-2016-0784" level="LOW"> <product>openmeetings:3.1.0</product> </cve> <cve id="CVE-2016-4159" level="MEDIUM"> <product>coldfusion:10.0</product> <product>coldfusion:11.0</product> <product>coldfusion:2016.00</product> </cve> <cve id="CVE-2016-1951" level="LOW"> <product>netscape_portable_runtime:4.11</product> </cve> <cve id="CVE-2016-7505" level="LOW"> <product>mujs:a3a4fe840b80706c706e86160352af5936f292d8</product> </cve> <cve id="CVE-2016-8331" level="MEDIUM"> <product>libtiff:4.0.6</product> </cve> <cve id="CVE-2016-8332" level="MEDIUM"> <product>openjpeg:2.1.1</product> </cve> <cve id="CVE-2016-1430" level="LOW"> <product>rv180_vpn_router_firmware</product> <product>rv180w_vpn_router_firmware</product> </cve> <cve id="CVE-2016-1431" level="MEDIUM"> <product>firepower_management_center:4.10.3</product> <product>firepower_management_center:5.2.0</product> <product>firepower_management_center:5.3.0</product> <product>firepower_management_center:5.3.1</product> <product>firepower_management_center:5.4.0</product> </cve> <cve id="CVE-2016-1434" level="LOW"> <product>ip_phone_8800_series_firmware:11.0%281%29</product> </cve> <cve id="CVE-2016-1435" level="HIGH"> <product>ip_phone_8800_series_firmware:11.0%281%29</product> </cve> <cve id="CVE-2016-4157" level="MEDIUM"> <product>creative_cloud:3.6.0.248</product> </cve> <cve id="CVE-2016-3051" level="LOW"> <product>security_access_manager_9.0_firmware</product> </cve> <cve id="CVE-2016-3052" level="MEDIUM"> <product>websphere_mq:8.0.0.5</product> </cve> <cve id="CVE-2016-3053" level="LOW"> <product>aix</product> </cve> <cve id="CVE-2016-3054" level="MEDIUM"> <product>filenet_workplace:4.0.2</product> </cve> <cve id="CVE-2016-3055" level="LOW"> <product>filenet_workplace:4.0.2</product> </cve> <cve id="CVE-2016-3056" level="MEDIUM"> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.0</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.0.1</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.0</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.1</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:7.5.1.2</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.0.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.0</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.1</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.2</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.0.1.3</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.0</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.1</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.0.2</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.5.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.0</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.6.2</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> <product>business_process_manager:8.5.7.0</product> </cve> <cve id="CVE-2016-3057" level="MEDIUM"> <product>sterling_b2b_integrator:5.2</product> </cve> <cve id="CVE-2016-6578" level="MEDIUM"> <product>filecloud:13.0.0.32841</product> </cve> <cve id="CVE-2016-3059" level="LOW"> <product>tivoli_storage_flashcopy_manager_for_sql_server:3.1.1.7</product> <product>tivoli_storage_flashcopy_manager_for_sql_server:3.2.1.5</product> <product>your_sha256_hashft_sql_server:6.3.1.5</product> <product>your_sha256_hashft_sql_server:6.4.1.7</product> </cve> <cve id="CVE-2016-0501" level="LOW"> <product>secure_global_desktop:5.2</product> </cve> <cve id="CVE-2016-0500" level="LOW"> <product>retail_order_broker_cloud_service:4.0</product> <product>retail_order_broker_cloud_service:4.1</product> </cve> <cve id="CVE-2016-7227" level="HIGH"> <product>edge</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0506" level="MEDIUM"> <product>retail_order_management_system_cloud_service:3.5</product> <product>retail_order_management_system_cloud_service:4.5</product> <product>retail_order_management_system_cloud_service:4.7</product> <product>retail_order_management_system_cloud_service:5.0</product> <product>retail_order_management_system_cloud_service:15.0</product> </cve> <cve id="CVE-2016-0509" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-0508" level="MEDIUM"> <product>ilearning:6.0</product> <product>ilearning:6.1</product> </cve> <cve id="CVE-2016-8756" level="MEDIUM"> <product>mate_8_firmware:nxt-al10c00b197</product> <product>mate_8_firmware:nxt-cl10c00b197</product> <product>mate_8_firmware:nxt-dl10c00b197</product> <product>mate_8_firmware:nxt-tl10c00b197</product> </cve> <cve id="CVE-2016-8757" level="MEDIUM"> <product>p9_firmware:eva-al10c00b192</product> <product>p9_firmware:eva-cl10c00b192</product> <product>p9_firmware:eva-dl10c00b192</product> <product>p9_firmware:eva-tl10c00b192</product> </cve> <cve id="CVE-2016-8754" level="MEDIUM"> <product>oceanstor_5600_v3_firmware:v300r003c00</product> </cve> <cve id="CVE-2016-8752" level="LOW"> <product>atlas:0.6.0</product> <product>atlas:0.6.0</product> <product>atlas:0.6.0</product> <product>atlas:0.7.0</product> <product>atlas:0.7.0</product> <product>atlas:0.7.0</product> <product>atlas:0.7.1</product> <product>atlas:0.7.1</product> <product>atlas:0.7.1</product> <product>atlas:0.7.1</product> </cve> <cve id="CVE-2016-8751" level="MEDIUM"> <product>ranger:0.5.3</product> </cve> <cve id="CVE-2016-8758" level="MEDIUM"> <product>mate_8_firmware:nxt-al10c00b561</product> <product>mate_8_firmware:nxt-cl10c00b561</product> <product>mate_8_firmware:nxt-dl10c00b561</product> <product>mate_8_firmware:nxt-tl10c00b561</product> </cve> <cve id="CVE-2016-8759" level="MEDIUM"> <product>honor_6_firmware:-</product> <product>p9_firmware:-</product> <product>p9_plus_firmware:-</product> </cve> <cve id="CVE-2016-9481" level="LOW"> <product>exponent_cms:2.4.0</product> </cve> <cve id="CVE-2016-9480" level="LOW"> <product>libdwarf:2016-10-21</product> </cve> <cve id="CVE-2016-9483" level="LOW"> <product>php_formmail_generator:-</product> </cve> <cve id="CVE-2016-9482" level="LOW"> <product>php_formmail_generator:-</product> </cve> <cve id="CVE-2016-9485" level="LOW"> <product>secureconnector:-</product> </cve> <cve id="CVE-2016-4429" level="LOW"> <product>glibc</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-9487" level="MEDIUM"> <product>epubcheck:4.0.1</product> </cve> <cve id="CVE-2016-9486" level="LOW"> <product>secureconnector:-</product> </cve> <cve id="CVE-2016-9489" level="LOW"> <product>manageengine_applications_manager:12.0</product> <product>manageengine_applications_manager:13.0</product> </cve> <cve id="CVE-2016-4425" level="LOW"> <product>jansson:2.7</product> </cve> <cve id="CVE-2016-8285" level="MEDIUM"> <product>your_sha256_hash:9.2</product> </cve> <cve id="CVE-2016-8280" level="LOW"> <product>esight:v300r002c00</product> <product>esight:v300r003c10</product> <product>esight:v300r003c20</product> </cve> <cve id="CVE-2016-8281" level="LOW"> <product>platform_security_for_java:12.1.3.0.0</product> <product>platform_security_for_java:12.2.1.0.0</product> <product>platform_security_for_java:12.2.1.1.0</product> </cve> <cve id="CVE-2016-8282" level="MEDIUM"> <product>flexcube_private_banking:2.0.1</product> <product>flexcube_private_banking:2.2.0</product> <product>flexcube_private_banking:12.0.1</product> </cve> <cve id="CVE-2016-8576" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8577" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8574" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-8575" level="LOW"> <product>tcpdump:4.8.1</product> </cve> <cve id="CVE-2016-8578" level="MEDIUM"> <product>qemu:-</product> </cve> <cve id="CVE-2016-8579" level="LOW"> <product>docker2aci:0.12.3</product> </cve> <cve id="CVE-2016-1368" level="LOW"> <product>firesight_system_software:5.2.0</product> <product>firesight_system_software:5.2.0.1</product> <product>firesight_system_software:5.2.0.2</product> <product>firesight_system_software:5.2.0.3</product> <product>firesight_system_software:5.2.0.4</product> <product>firesight_system_software:5.2.0.5</product> <product>firesight_system_software:5.2.0.6</product> <product>firesight_system_software:5.2.0.8</product> <product>firesight_system_software:5.3.0</product> <product>firesight_system_software:5.3.0.1</product> <product>firesight_system_software:5.3.0.2</product> <product>firesight_system_software:5.3.0.3</product> <product>firesight_system_software:5.3.0.4</product> <product>firesight_system_software:5.3.0.5</product> <product>firesight_system_software:5.3.0.6</product> <product>firesight_system_software:5.3.0.7</product> <product>firesight_system_software:5.3.1</product> <product>firesight_system_software:5.3.1.1</product> <product>firesight_system_software:5.3.1.2</product> <product>firesight_system_software:5.3.1.3</product> <product>firesight_system_software:5.3.1.4</product> <product>firesight_system_software:5.3.1.5</product> <product>firesight_system_software:5.3.1.6</product> <product>firesight_system_software:5.3.1.7</product> <product>firesight_system_software:5.4.0</product> <product>firesight_system_software:5.4.0.1</product> <product>firesight_system_software:5.4.0.2</product> <product>firesight_system_software:5.4.0.3</product> </cve> <cve id="CVE-2016-1369" level="LOW"> <product>asa_with_firepower_services:5.3.1</product> <product>asa_with_firepower_services:5.3.1.1</product> <product>asa_with_firepower_services:5.4.0</product> <product>asa_with_firepower_services:5.4.0.1</product> <product>asa_with_firepower_services:5.4.0.2</product> <product>asa_with_firepower_services:5.4.0.3</product> <product>asa_with_firepower_services:5.4.0.4</product> <product>asa_with_firepower_services:5.4.0.5</product> <product>asa_with_firepower_services:5.4.0.6</product> <product>asa_with_firepower_services:5.4.1</product> <product>asa_with_firepower_services:5.4.1.1</product> <product>asa_with_firepower_services:5.4.1.2</product> <product>asa_with_firepower_services:5.4.1.3</product> <product>asa_with_firepower_services:5.4.1.4</product> <product>asa_with_firepower_services:5.4.1.5</product> <product>asa_with_firepower_services:5.4.05</product> <product>asa_with_firepower_services:6.0.0</product> </cve> <cve id="CVE-2016-1360" level="MEDIUM"> <product>prime_lan_management_solution:4.1_base</product> <product>prime_lan_management_solution:4.2.1</product> <product>prime_lan_management_solution:4.2.2</product> <product>prime_lan_management_solution:4.2.3</product> <product>prime_lan_management_solution:4.2.4</product> <product>prime_lan_management_solution:4.2.5</product> <product>prime_lan_management_solution:4.2_base</product> </cve> <cve id="CVE-2016-1362" level="LOW"> <product>aireos:4.1_base</product> <product>aireos:7.4</product> <product>aireos:7.5_base</product> <product>aireos:7.6</product> </cve> <cve id="CVE-2016-1363" level="LOW"> <product>wireless_lan_controller_software:7.4.1.1</product> <product>wireless_lan_controller_software:7.4.1.19</product> <product>wireless_lan_controller_software:7.4.1.54</product> <product>wireless_lan_controller_software:7.4.100</product> <product>wireless_lan_controller_software:7.4.100.60</product> <product>wireless_lan_controller_software:7.4.110.0</product> <product>wireless_lan_controller_software:7.4.121.0</product> <product>wireless_lan_controller_software:7.5.102.0</product> <product>wireless_lan_controller_software:7.5.102.11</product> <product>wireless_lan_controller_software:7.6.1.62</product> <product>wireless_lan_controller_software:7.6.100.0</product> <product>wireless_lan_controller_software:7.6.110.0</product> <product>wireless_lan_controller_software:7.6.120.0</product> <product>wireless_lan_controller_software:7.6.130.0</product> <product>wireless_lan_controller_software:8.0.72.140</product> <product>wireless_lan_controller_software:8.0.100</product> <product>wireless_lan_controller_software:8.1.0</product> </cve> <cve id="CVE-2016-1364" level="LOW"> <product>wireless_lan_controller_software:7.4.1.1</product> <product>wireless_lan_controller_software:7.4.1.19</product> <product>wireless_lan_controller_software:7.4.1.54</product> <product>wireless_lan_controller_software:7.4.100</product> <product>wireless_lan_controller_software:7.4.100.60</product> <product>wireless_lan_controller_software:7.4.110.0</product> <product>wireless_lan_controller_software:7.4.121.0</product> <product>wireless_lan_controller_software:7.5.102.0</product> <product>wireless_lan_controller_software:7.5.102.11</product> <product>wireless_lan_controller_software:7.6.1.62</product> <product>wireless_lan_controller_software:7.6.100.0</product> <product>wireless_lan_controller_software:7.6.110.0</product> <product>wireless_lan_controller_software:7.6.120.0</product> <product>wireless_lan_controller_software:7.6.130.0</product> <product>wireless_lan_controller_software:8.0.0</product> <product>wireless_lan_controller_software:8.0.72.140</product> <product>wireless_lan_controller_software:8.0.100</product> </cve> <cve id="CVE-2016-1365" level="MEDIUM"> <product>application_policy_infrastructure_controller_enterprise_module:1.0.10</product> </cve> <cve id="CVE-2016-1367" level="LOW"> <product>adaptive_security_appliance_software:9.4.1</product> </cve> <cve id="CVE-2016-2868" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-2869" level="MEDIUM"> <product>qradar_security_information_and_event_manager:7.1.0</product> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.2.1</product> <product>qradar_security_information_and_event_manager:7.2.2</product> <product>qradar_security_information_and_event_manager:7.2.3</product> <product>qradar_security_information_and_event_manager:7.2.4</product> <product>qradar_security_information_and_event_manager:7.2.5</product> <product>qradar_security_information_and_event_manager:7.2.6</product> </cve> <cve id="CVE-2016-9629" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9628" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9159" level="MEDIUM"> <product>simatic_s7-300_cpu_firmware:-</product> <product>simatic_s7-400_cpu_firmware:-</product> </cve> <cve id="CVE-2016-9158" level="LOW"> <product>simatic_s7-300_cpu_firmware:-</product> <product>simatic_s7-400_cpu_firmware:-</product> </cve> <cve id="CVE-2016-9157" level="LOW"> <product>sicam_pas:8.08</product> </cve> <cve id="CVE-2016-9156" level="LOW"> <product>sicam_pas:8.08</product> </cve> <cve id="CVE-2016-9627" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-9154" level="LOW"> <product>desigo_web_module_pxa30-w0_firmware:6.00.00</product> <product>desigo_web_module_pxa30-w1_firmware:6.00.00</product> <product>desigo_web_module_pxa30-w2_firmware:6.00.00</product> <product>desigo_web_module_pxa40-w0_firmware:6.00.00</product> <product>desigo_web_module_pxa40-w1_firmware:6.00.00</product> <product>desigo_web_module_pxa40-w2_firmware:6.00.00</product> </cve> <cve id="CVE-2016-2866" level="LOW"> <product>rational_collaborative_lifecycle_management:4.0.0</product> <product>rational_collaborative_lifecycle_management:4.0.1</product> <product>rational_collaborative_lifecycle_management:4.0.2</product> <product>rational_collaborative_lifecycle_management:4.0.3</product> <product>rational_collaborative_lifecycle_management:4.0.4</product> <product>rational_collaborative_lifecycle_management:4.0.5</product> <product>rational_collaborative_lifecycle_management:4.0.6</product> <product>rational_collaborative_lifecycle_management:4.0.7</product> <product>rational_collaborative_lifecycle_management:5.0.0</product> <product>rational_collaborative_lifecycle_management:5.0.1</product> <product>rational_collaborative_lifecycle_management:5.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.0</product> <product>rational_collaborative_lifecycle_management:6.0.1</product> <product>rational_collaborative_lifecycle_management:6.0.2</product> <product>rational_collaborative_lifecycle_management:6.0.3</product> </cve> <cve id="CVE-2016-9152" level="MEDIUM"> <product>spip:3.1.3</product> </cve> <cve id="CVE-2016-9151" level="LOW"> <product>pan-os:5.0.19</product> <product>pan-os:5.1.12</product> <product>pan-os:6.0.14</product> <product>pan-os:7.0.10</product> <product>pan-os:7.1.5</product> </cve> <cve id="CVE-2016-9622" level="MEDIUM"> <product>w3m:0.5.3-32</product> </cve> <cve id="CVE-2016-3413" level="LOW"> <product>zimbra_collaboration_suite:8.6.0</product> </cve> <cve id="CVE-2016-5486" level="LOW"> <product>sun_zfs_storage_appliance_kit:ak_2013</product> </cve> <cve id="CVE-2016-5481" level="MEDIUM"> <product>sun_zfs_storage_appliance_kit:ak_2013</product> </cve> <cve id="CVE-2016-5482" level="MEDIUM"> <product>commerce_guided_search:6.2.2</product> <product>commerce_guided_search:6.3.0</product> <product>commerce_guided_search:6.4.1.2</product> <product>commerce_guided_search:6.5.0</product> <product>commerce_guided_search:6.5.1</product> <product>commerce_guided_search:6.5.2</product> </cve> <cve id="CVE-2016-5489" level="MEDIUM"> <product>istore:12.1.1</product> <product>istore:12.1.2</product> <product>istore:12.1.3</product> <product>istore:12.2.3</product> <product>istore:12.2.4</product> </cve> <cve id="CVE-2016-2288" level="LOW"> <product>cogent_datahub:7.3.9</product> </cve> <cve id="CVE-2016-2289" level="LOW"> <product>webhmi:9.0</product> </cve> <cve id="CVE-2016-2286" level="LOW"> <product>miineport_e1_4641_firmware:1.1.10</product> <product>miineport_e1_7080_firmware:1.1.10</product> <product>miineport_e2_1242_firmware:1.1</product> <product>miineport_e2_4561_firmware:1.1</product> <product>miineport_e3_firmware:1.0</product> </cve> <cve id="CVE-2016-2287" level="MEDIUM"> <product>442sr_os:-</product> </cve> <cve id="CVE-2016-2285" level="MEDIUM"> <product>miineport_e1_4641_firmware:1.1.10</product> <product>miineport_e1_7080_firmware:1.1.10</product> <product>miineport_e2_1242_firmware:1.1</product> <product>miineport_e2_4561_firmware:1.1</product> <product>miineport_e3_firmware:1.0</product> </cve> <cve id="CVE-2016-2282" level="LOW"> <product>ioadmin_firmware:3.17</product> <product>iologik_firmware:3.11</product> </cve> <cve id="CVE-2016-2283" level="LOW"> <product>ioadmin_firmware:3.17</product> <product>iologik_firmware:3.11</product> </cve> <cve id="CVE-2016-2280" level="LOW"> <product>uniformance_process_history_database:r310</product> <product>uniformance_process_history_database:r320</product> <product>uniformance_process_history_database:r321</product> </cve> <cve id="CVE-2016-2281" level="HIGH"> <product>panel_builder_800:5.1</product> </cve> <cve id="CVE-2016-9498" level="LOW"> <product>manageengine_applications_manager:12.0</product> <product>manageengine_applications_manager:13.0</product> </cve> <cve id="CVE-2016-6909" level="LOW"> <product>fortios:4.1.10</product> <product>fortios:4.2.12</product> <product>fortios:4.3.8</product> <product>fortiswitch:3.4.2</product> </cve> <cve id="CVE-2016-6908" level="MEDIUM"> <product>opera_browser:37.0.2192.105088</product> </cve> <cve id="CVE-2016-6901" level="LOW"> <product>ar_firmware:v200r005</product> <product>ar_firmware:v200r006</product> <product>ar_firmware:v200r007c00</product> <product>netengine_16ex_firmware:v200r005</product> <product>netengine_16ex_firmware:v200r006</product> <product>netengine_16ex_firmware:v200r007c00</product> </cve> <cve id="CVE-2016-6900" level="LOW"> <product>rh1288_v3_server_firmware:v100r003c00</product> <product>rh2288_v3_server_firmware:v100r003c00</product> <product>rh2288h_v3_server_firmware:v100r003c00</product> <product>rh5885_v3_server_firmware:v100r003c01</product> <product>xh620_v3_server_firmware:v100r003c00</product> <product>xh622_v3_server_firmware:v100r003c00</product> <product>xh628_v3_server_firmware:v100r003c00</product> </cve> <cve id="CVE-2016-6903" level="LOW"> <product>lshell:0.9.16</product> </cve> <cve id="CVE-2016-6902" level="LOW"> <product>lshell:0.9.16</product> </cve> <cve id="CVE-2016-6905" level="MEDIUM"> <product>libgd:2.2.2</product> <product>leap:42.1</product> <product>opensuse:13.2</product> </cve> <cve id="CVE-2016-6904" level="MEDIUM"> <product>vasa_provider:7.0</product> </cve> <cve id="CVE-2016-3427" level="LOW"> <product>jdk:1.6.0</product> <product>jdk:1.7.0</product> <product>jdk:1.8.0</product> <product>jre:1.6.0</product> <product>jre:1.7.0</product> <product>jre:1.8.0</product> <product>jrockit:r28.3.9</product> </cve> <cve id="CVE-2016-6906" level="MEDIUM"> <product>libgd:2.2.3</product> </cve> <cve id="CVE-2016-9207" level="LOW"> <product>expressway:x8.7.2</product> <product>expressway:x8.8.3</product> </cve> <cve id="CVE-2016-9206" level="MEDIUM"> <product>unified_communications_manager:11.5%281.10000.6%29</product> </cve> <cve id="CVE-2016-9757" level="MEDIUM"> <product>nexpose:6.4.12</product> </cve> <cve id="CVE-2016-7508" level="MEDIUM"> <product>glpi:0.90.4</product> </cve> <cve id="CVE-2016-1000151" level="MEDIUM"> <product>tera-charts:1.0</product> </cve> <cve id="CVE-2016-9751" level="MEDIUM"> <product>piwigo:2.8.3</product> </cve> <cve id="CVE-2016-7506" level="LOW"> <product>mujs:8c805b4eb19cf2af689c860b77e6111d2ee439d5</product> </cve> <cve id="CVE-2016-7507" level="MEDIUM"> <product>glpi:0.90.4</product> </cve> <cve id="CVE-2016-7504" level="LOW"> <product>mujs:5000749f5afe3b956fc916e407309de840997f4a</product> </cve> <cve id="CVE-2016-9750" level="LOW"> <product>qradar_security_information_and_event_manager:7.2.0</product> <product>qradar_security_information_and_event_manager:7.3.0</product> </cve> <cve id="CVE-2016-1000155" level="MEDIUM"> <product>wpsolr-search-engine:7.6</product> </cve> <cve id="CVE-2016-6639" level="LOW"> <product>cloud_foundry_elastic_runtime:1.6.37</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_elastic_runtime:1.7.13</product> <product>cloud_foundry_elastic_runtime:1.7.14</product> <product>cloud_foundry_elastic_runtime:1.7.15</product> <product>cloud_foundry_elastic_runtime:1.7.16</product> <product>cloud_foundry_elastic_runtime:1.7.17</product> <product>cloud_foundry_elastic_runtime:1.7.18</product> <product>cloud_foundry_php_buildpack:4.3.17</product> </cve> <cve id="CVE-2016-6633" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6632" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6631" level="MEDIUM"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6630" level="LOW"> <product>phpmyadmin:4.0.0</product> <product>phpmyadmin:4.0.1</product> <product>phpmyadmin:4.0.2</product> <product>phpmyadmin:4.0.3</product> <product>phpmyadmin:4.0.4</product> <product>phpmyadmin:4.0.4.1</product> <product>phpmyadmin:4.0.4.2</product> <product>phpmyadmin:4.0.5</product> <product>phpmyadmin:4.0.6</product> <product>phpmyadmin:4.0.7</product> <product>phpmyadmin:4.0.8</product> <product>phpmyadmin:4.0.9</product> <product>phpmyadmin:4.0.10</product> <product>phpmyadmin:4.0.10.1</product> <product>phpmyadmin:4.0.10.2</product> <product>phpmyadmin:4.0.10.3</product> <product>phpmyadmin:4.0.10.4</product> <product>phpmyadmin:4.0.10.5</product> <product>phpmyadmin:4.0.10.6</product> <product>phpmyadmin:4.0.10.7</product> <product>phpmyadmin:4.0.10.8</product> <product>phpmyadmin:4.0.10.9</product> <product>phpmyadmin:4.0.10.10</product> <product>phpmyadmin:4.0.10.11</product> <product>phpmyadmin:4.0.10.12</product> <product>phpmyadmin:4.0.10.13</product> <product>phpmyadmin:4.0.10.14</product> <product>phpmyadmin:4.0.10.15</product> <product>phpmyadmin:4.0.10.16</product> <product>phpmyadmin:4.4.0</product> <product>phpmyadmin:4.4.1</product> <product>phpmyadmin:4.4.1.1</product> <product>phpmyadmin:4.4.2</product> <product>phpmyadmin:4.4.3</product> <product>phpmyadmin:4.4.4</product> <product>phpmyadmin:4.4.5</product> <product>phpmyadmin:4.4.6</product> <product>phpmyadmin:4.4.6.1</product> <product>phpmyadmin:4.4.7</product> <product>phpmyadmin:4.4.8</product> <product>phpmyadmin:4.4.9</product> <product>phpmyadmin:4.4.10</product> <product>phpmyadmin:4.4.11</product> <product>phpmyadmin:4.4.12</product> <product>phpmyadmin:4.4.13</product> <product>phpmyadmin:4.4.13.1</product> <product>phpmyadmin:4.4.14</product> <product>phpmyadmin:4.4.14.1</product> <product>phpmyadmin:4.4.15</product> <product>phpmyadmin:4.4.15.1</product> <product>phpmyadmin:4.4.15.2</product> <product>phpmyadmin:4.4.15.3</product> <product>phpmyadmin:4.4.15.4</product> <product>phpmyadmin:4.4.15.5</product> <product>phpmyadmin:4.4.15.6</product> <product>phpmyadmin:4.4.15.7</product> <product>phpmyadmin:4.6.0</product> <product>phpmyadmin:4.6.1</product> <product>phpmyadmin:4.6.2</product> <product>phpmyadmin:4.6.3</product> </cve> <cve id="CVE-2016-6637" level="MEDIUM"> <product>cloud_foundry:241</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.6.30</product> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.6.33</product> <product>cloud_foundry_elastic_runtime:1.6.34</product> <product>cloud_foundry_elastic_runtime:1.6.35</product> <product>cloud_foundry_elastic_runtime:1.6.36</product> <product>cloud_foundry_elastic_runtime:1.6.37</product> <product>cloud_foundry_elastic_runtime:1.6.38</product> <product>cloud_foundry_elastic_runtime:1.6.39</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_elastic_runtime:1.7.13</product> <product>cloud_foundry_elastic_runtime:1.7.14</product> <product>cloud_foundry_elastic_runtime:1.7.15</product> <product>cloud_foundry_elastic_runtime:1.7.16</product> <product>cloud_foundry_elastic_runtime:1.7.17</product> <product>cloud_foundry_elastic_runtime:1.7.18</product> <product>cloud_foundry_elastic_runtime:1.7.19</product> <product>cloud_foundry_elastic_runtime:1.7.20</product> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_ops_manager:1.7.0</product> <product>cloud_foundry_ops_manager:1.7.1</product> <product>cloud_foundry_ops_manager:1.7.2</product> <product>cloud_foundry_ops_manager:1.7.3</product> <product>cloud_foundry_ops_manager:1.7.4</product> <product>cloud_foundry_ops_manager:1.7.5</product> <product>cloud_foundry_ops_manager:1.7.6</product> <product>cloud_foundry_ops_manager:1.7.7</product> <product>cloud_foundry_ops_manager:1.7.8</product> <product>cloud_foundry_ops_manager:1.7.9</product> <product>cloud_foundry_ops_manager:1.7.10</product> <product>cloud_foundry_ops_manager:1.7.11</product> <product>cloud_foundry_ops_manager:1.7.12</product> <product>cloud_foundry_ops_manager:1.8.0</product> <product>cloud_foundry_uaa:2.3.0</product> <product>cloud_foundry_uaa:2.3.1</product> <product>cloud_foundry_uaa:2.4.0</product> <product>cloud_foundry_uaa:2.5.1</product> <product>cloud_foundry_uaa:2.6.1</product> <product>cloud_foundry_uaa:2.7.0.2</product> <product>cloud_foundry_uaa:2.7.0.3</product> <product>cloud_foundry_uaa:2.7.1</product> <product>cloud_foundry_uaa:2.7.2</product> <product>cloud_foundry_uaa:2.7.3</product> <product>cloud_foundry_uaa:2.7.4.6</product> <product>cloud_foundry_uaa:3.0.0</product> <product>cloud_foundry_uaa:3.0.1</product> <product>cloud_foundry_uaa:3.1.0</product> <product>cloud_foundry_uaa:3.2.0</product> <product>cloud_foundry_uaa:3.2.1</product> <product>cloud_foundry_uaa:3.3.0</product> <product>cloud_foundry_uaa:3.3.0.1</product> <product>cloud_foundry_uaa:3.4.0</product> <product>cloud_foundry_uaa:3.4.1</product> <product>cloud_foundry_uaa:3.4.2</product> <product>cloud_foundry_uaa_bosh:15.0</product> </cve> <cve id="CVE-2016-6636" level="LOW"> <product>cloud_foundry:241</product> <product>cloud_foundry_elastic_runtime:1.6.0</product> <product>cloud_foundry_elastic_runtime:1.6.1</product> <product>cloud_foundry_elastic_runtime:1.6.2</product> <product>cloud_foundry_elastic_runtime:1.6.3</product> <product>cloud_foundry_elastic_runtime:1.6.4</product> <product>cloud_foundry_elastic_runtime:1.6.5</product> <product>cloud_foundry_elastic_runtime:1.6.6</product> <product>cloud_foundry_elastic_runtime:1.6.7</product> <product>cloud_foundry_elastic_runtime:1.6.8</product> <product>cloud_foundry_elastic_runtime:1.6.9</product> <product>cloud_foundry_elastic_runtime:1.6.10</product> <product>cloud_foundry_elastic_runtime:1.6.11</product> <product>cloud_foundry_elastic_runtime:1.6.12</product> <product>cloud_foundry_elastic_runtime:1.6.13</product> <product>cloud_foundry_elastic_runtime:1.6.14</product> <product>cloud_foundry_elastic_runtime:1.6.15</product> <product>cloud_foundry_elastic_runtime:1.6.17</product> <product>cloud_foundry_elastic_runtime:1.6.18</product> <product>cloud_foundry_elastic_runtime:1.6.19</product> <product>cloud_foundry_elastic_runtime:1.6.20</product> <product>cloud_foundry_elastic_runtime:1.6.21</product> <product>cloud_foundry_elastic_runtime:1.6.22</product> <product>cloud_foundry_elastic_runtime:1.6.23</product> <product>cloud_foundry_elastic_runtime:1.6.25</product> <product>cloud_foundry_elastic_runtime:1.6.26</product> <product>cloud_foundry_elastic_runtime:1.6.27</product> <product>cloud_foundry_elastic_runtime:1.6.28</product> <product>cloud_foundry_elastic_runtime:1.6.29</product> <product>cloud_foundry_elastic_runtime:1.6.30</product> <product>cloud_foundry_elastic_runtime:1.6.31</product> <product>cloud_foundry_elastic_runtime:1.6.32</product> <product>cloud_foundry_elastic_runtime:1.6.33</product> <product>cloud_foundry_elastic_runtime:1.6.34</product> <product>cloud_foundry_elastic_runtime:1.6.35</product> <product>cloud_foundry_elastic_runtime:1.6.36</product> <product>cloud_foundry_elastic_runtime:1.6.37</product> <product>cloud_foundry_elastic_runtime:1.6.38</product> <product>cloud_foundry_elastic_runtime:1.6.39</product> <product>cloud_foundry_elastic_runtime:1.7.0</product> <product>cloud_foundry_elastic_runtime:1.7.1</product> <product>cloud_foundry_elastic_runtime:1.7.2</product> <product>cloud_foundry_elastic_runtime:1.7.3</product> <product>cloud_foundry_elastic_runtime:1.7.4</product> <product>cloud_foundry_elastic_runtime:1.7.5</product> <product>cloud_foundry_elastic_runtime:1.7.6</product> <product>cloud_foundry_elastic_runtime:1.7.7</product> <product>cloud_foundry_elastic_runtime:1.7.8</product> <product>cloud_foundry_elastic_runtime:1.7.9</product> <product>cloud_foundry_elastic_runtime:1.7.10</product> <product>cloud_foundry_elastic_runtime:1.7.11</product> <product>cloud_foundry_elastic_runtime:1.7.12</product> <product>cloud_foundry_elastic_runtime:1.7.13</product> <product>cloud_foundry_elastic_runtime:1.7.14</product> <product>cloud_foundry_elastic_runtime:1.7.15</product> <product>cloud_foundry_elastic_runtime:1.7.16</product> <product>cloud_foundry_elastic_runtime:1.7.17</product> <product>cloud_foundry_elastic_runtime:1.7.18</product> <product>cloud_foundry_elastic_runtime:1.7.19</product> <product>cloud_foundry_elastic_runtime:1.7.20</product> <product>cloud_foundry_elastic_runtime:1.8.0</product> <product>cloud_foundry_ops_manager:1.7.0</product> <product>cloud_foundry_ops_manager:1.7.1</product> <product>cloud_foundry_ops_manager:1.7.2</product> <product>cloud_foundry_ops_manager:1.7.3</product> <product>cloud_foundry_ops_manager:1.7.4</product> <product>cloud_foundry_ops_manager:1.7.5</product> <product>cloud_foundry_ops_manager:1.7.6</product> <product>cloud_foundry_ops_manager:1.7.7</product> <product>cloud_foundry_ops_manager:1.7.8</product> <product>cloud_foundry_ops_manager:1.7.9</product> <product>cloud_foundry_ops_manager:1.7.10</product> <product>cloud_foundry_ops_manager:1.7.11</product> <product>cloud_foundry_ops_manager:1.7.12</product> <product>cloud_foundry_ops_manager:1.8.0</product> <product>cloud_foundry_uaa:2.3.0</product> <product>cloud_foundry_uaa:2.3.1</product> <product>cloud_foundry_uaa:2.4.0</product> <product>cloud_foundry_uaa:2.5.1</product> <product>cloud_foundry_uaa:2.6.1</product> <product>cloud_foundry_uaa:2.7.0.2</product> <product>cloud_foundry_uaa:2.7.0.3</product> <product>cloud_foundry_uaa:2.7.1</product> <product>cloud_foundry_uaa:2.7.2</product> <product>cloud_foundry_uaa:2.7.3</product> <product>cloud_foundry_uaa:2.7.4.6</product> <product>cloud_foundry_uaa:3.0.0</product> <product>cloud_foundry_uaa:3.0.1</product> <product>cloud_foundry_uaa:3.1.0</product> <product>cloud_foundry_uaa:3.2.0</product> <product>cloud_foundry_uaa:3.2.1</product> <product>cloud_foundry_uaa:3.3.0</product> <product>cloud_foundry_uaa:3.3.0.1</product> <product>cloud_foundry_uaa:3.4.0</product> <product>cloud_foundry_uaa:3.4.1</product> <product>cloud_foundry_uaa:3.4.2</product> <product>cloud_foundry_uaa_bosh:12.3</product> </cve> <cve id="CVE-2016-0519" level="MEDIUM"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-8213" level="MEDIUM"> <product>documentum_administrator:7.0</product> <product>documentum_administrator:7.1</product> <product>documentum_administrator:7.2</product> <product>documentum_capital_projects:1.9</product> <product>documentum_capital_projects:1.10</product> <product>documentum_taskspace:6.7</product> <product>documentum_webtop:6.8</product> <product>documentum_webtop:6.8.1</product> </cve> <cve id="CVE-2016-0199" level="MEDIUM"> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0191" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-0192" level="HIGH"> <product>edge:-</product> <product>internet_explorer:9</product> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-0193" level="HIGH"> <product>edge:-</product> </cve> <cve id="CVE-2016-0194" level="HIGH"> <product>internet_explorer:10</product> <product>internet_explorer:11</product> </cve> <cve id="CVE-2016-7236" level="MEDIUM"> <product>excel:2010</product> <product>excel_for_mac:2011</product> <product>excel_for_mac:2016</product> <product>sharepoint_server:2010</product> </cve> <cve id="CVE-2016-8212" level="MEDIUM"> <product>rsa_bsafe_crypto-j:6.2.1</product> </cve> <cve id="CVE-2016-0517" level="LOW"> <product>e-business_suite:11.5.10.2</product> </cve> <cve id="CVE-2016-4855" level="MEDIUM"> <product>adodb:5.20.5</product> </cve> <cve id="CVE-2016-4854" level="MEDIUM"> <product>l-04d_firmware:v10a</product> <product>l-04d_firmware:v10b</product> </cve> <cve id="CVE-2016-4857" level="MEDIUM"> <product>splunk:6.2.0</product> <product>splunk:6.2.1</product> <product>splunk:6.2.2</product> <product>splunk:6.2.3</product> <product>splunk:6.2.4</product> <product>splunk:6.2.5</product> <product>splunk:6.2.6</product> <product>splunk:6.2.7</product> <product>splunk:6.2.8</product> <product>splunk:6.2.9</product> <product>splunk:6.2.10</product> <product>splunk:6.3.0</product> <product>splunk:6.3.1</product> <product>splunk:6.3.2</product> <product>splunk:6.3.3</product> <product>splunk:6.3.4</product> <product>splunk:6.3.5</product> <product>splunk:6.4.0</product> <product>splunk:6.4.1</product> <product>splunk:6.4.2</product> </cve> <cve id="CVE-2016-4856" level="MEDIUM"> <product>splunk:6.3.0</product> <product>splunk:6.3.0</product> <product>splunk:6.3.1</product> <product>splunk:6.3.1</product> <product>splunk:6.3.2</product> <product>splunk:6.3.2</product> <product>splunk:6.3.3</product> <product>splunk:6.3.3</product> <product>splunk:6.3.4</product> <product>splunk:6.3.4</product> </cve> <cve id="CVE-2016-4851" level="MEDIUM"> <product>simple_chat:-</product> </cve> <cve id="CVE-2016-4850" level="MEDIUM"> <product>line:4.8.2.1125</product> </cve> <cve id="CVE-2016-4853" level="MEDIUM"> <product>happy_wardrobe:-</product> </cve> <cve id="CVE-2016-4852" level="MEDIUM"> <product>yorufukurou:2.84</product> </cve> <cve id="CVE-2016-4859" level="MEDIUM"> <product>splunk:5.0.0</product> <product>splunk:5.0.1</product> <product>splunk:5.0.2</product> <product>splunk:5.0.3</product> <product>splunk:5.0.4</product> <product>splunk:5.0.5</product> <product>splunk:5.0.6</product> <product>splunk:5.0.7</product> <product>splunk:5.0.8</product> <product>splunk:5.0.9</product> <product>splunk:5.0.10</product> <product>splunk:5.0.11</product> <product>splunk:5.0.12</product> <product>splunk:5.0.13</product> <product>splunk:5.0.14</product> <product>splunk:5.0.15</product> <product>splunk:6.0.0</product> <product>splunk:6.0.1</product> <product>splunk:6.0.2</product> <product>splunk:6.0.3</product> <product>splunk:6.0.4</product> <product>splunk:6.0.5</product> <product>splunk:6.0.6</product> <product>splunk:6.0.7</product> <product>splunk:6.0.8</product> <product>splunk:6.0.9</product> <product>splunk:6.0.10</product> <product>splunk:6.0.11</product> <product>splunk:6.1.0</product> <product>splunk:6.1.1</product> <product>splunk:6.1.2</product> <product>splunk:6.1.3</product> <product>splunk:6.1.4</product> <product>splunk:6.1.5</product> <product>splunk:6.1.6</product> <product>splunk:6.1.7</product> <product>splunk:6.1.8</product> <product>splunk:6.1.9</product> <product>splunk:6.1.10</product> <product>splunk:6.2.0</product> <product>splunk:6.2.1</product> <product>splunk:6.2.2</product> <product>splunk:6.2.3</product> <product>splunk:6.2.4</product> <product>splunk:6.2.5</product> <product>splunk:6.2.6</product> <product>splunk:6.2.7</product> <product>splunk:6.2.8</product> <product>splunk:6.2.9</product> <product>splunk:6.3.0</product> <product>splunk:6.3.1</product> <product>splunk:6.3.2</product> <product>splunk:6.3.3</product> <product>splunk:6.3.4</product> <product>splunk:6.3.5</product> <product>splunk:6.4.0</product> <product>splunk:6.4.1</product> <product>splunk:6.4.2</product> </cve> <cve id="CVE-2016-4858" level="MEDIUM"> <product>splunk:5.0.0</product> <product>splunk:5.0.1</product> <product>splunk:5.0.2</product> <product>splunk:5.0.3</product> <product>splunk:5.0.4</product> <product>splunk:5.0.5</product> <product>splunk:5.0.6</product> <product>splunk:5.0.7</product> <product>splunk:5.0.8</product> <product>splunk:5.0.9</product> <product>splunk:5.0.10</product> <product>splunk:5.0.11</product> <product>splunk:5.0.12</product> <product>splunk:5.0.13</product> <product>splunk:5.0.14</product> <product>splunk:5.0.15</product> <product>splunk:6.0.0</product> <product>splunk:6.0.1</product> <product>splunk:6.0.2</product> <product>splunk:6.0.3</product> <product>splunk:6.0.4</product> <product>splunk:6.0.5</product> <product>splunk:6.0.6</product> <product>splunk:6.0.7</product> <product>splunk:6.0.8</product> <product>splunk:6.0.9</product> <product>splunk:6.0.10</product> <product>splunk:6.0.11</product> <product>splunk:6.1.0</product> <product>splunk:6.1.1</product> <product>splunk:6.1.2</product> <product>splunk:6.1.3</product> <product>splunk:6.1.4</product> <product>splunk:6.1.5</product> <product>splunk:6.1.6</product> <product>splunk:6.1.7</product> <product>splunk:6.1.8</product> <product>splunk:6.1.9</product> <product>splunk:6.1.10</product> <product>splunk:6.2.0</product> <product>splunk:6.2.1</product> <product>splunk:6.2.2</product> <product>splunk:6.2.3</product> <product>splunk:6.2.4</product> <product>splunk:6.2.5</product> <product>splunk:6.2.6</product> <product>splunk:6.2.7</product> <product>splunk:6.2.8</product> <product>splunk:6.2.9</product> <product>splunk:6.2.10</product> <product>splunk:6.3.0</product> <product>splunk:6.3.1</product> <product>splunk:6.3.2</product> <product>splunk:6.3.3</product> <product>splunk:6.3.4</product> <product>splunk:6.3.5</product> <product>splunk:6.4.0</product> <product>splunk:6.4.1</product> <product>splunk:6.4.2</product> </cve> </cobra> ```
/content/code_sandbox/rules/CVI-999016.xml
xml
2016-04-15T08:41:15
2024-08-16T10:33:17
Cobra
FeeiCN/Cobra
3,133
1,016,066
```xml /* * This software is released under MIT license. * The full license information can be found in LICENSE in the root directory of this project. */ import { html, TemplateResult } from 'lit'; import { query } from 'lit/decorators/query.js'; import { animate, AnimationModalEnterName, i18n, I18nService, isScrollable, HTMLAttributeTuple, property, reverseAnimation, querySlot, getElementUpdates, } from '@cds/core/internal'; import { CdsInternalOverlay } from '@cds/core/internal-components/overlay'; import styles from './modal.element.scss'; import { CdsModalHeader } from './modal-header.element'; import { CdsModalActions } from './modal-actions.element'; /** * Web component modal. * * ```typescript * import '@cds/core/modal/register.js'; * ``` * * ```html * <cds-modal> * <cds-modal-header> * <h3 cds-text="title">My Modal</h3> * </cds-modal-header> * <cds-modal-content> * <p>Lorem Ipsum</p> * </cds-modal-content> * <cds-modal-actions> * <cds-button>Ok</cds-button> * </cds-modal-actions> * </cds-modal> * ``` * * @element cds-modal * @slot * @slot cds-modal-content * @slot cds-modal-header * @slot cds-modal-actions * @event closeChange - notify when the user has clicked the close button * @cssprop --backdrop-background - inherited from the internal overlay component * @cssprop --layered-backdrop-background - inherited from the internal overlay component * @cssprop --border-color * @cssprop --border-width * @cssprop --border-radius * @cssprop --background * @cssprop --box-shadow * @cssprop --width * @cssprop --content-overflow - set as { x, y }. take care when customizing because overflow settings can have unintended side effects. * @cssprop --max-height - sets hard limit on height of modal * @cssprop --tablet-max-height - sets hard limit on height of modal when on a tablet in landscape mode */ @animate({ hidden: { true: reverseAnimation(AnimationModalEnterName), false: AnimationModalEnterName, }, }) export class CdsModal extends CdsInternalOverlay { protected get customBumpers(): [HTMLElement, HTMLElement] { return [this.modalHeader, this.modalFooter]; } static get styles() { return [...super.styles, styles]; } @i18n() i18n = I18nService.keys.modal; /** If false, the modal will not render the close button. */ @property({ type: Boolean }) closable = true; /** Sets the overall height and width of the modal and icon based on value */ @property({ type: String }) size: 'default' | 'sm' | 'lg' | 'xl'; @query('.modal-body') content: HTMLElement; @querySlot('cds-modal-header') modalHeader: CdsModalHeader; @querySlot('cds-modal-actions') modalFooter: CdsModalActions; protected get closeButtonAttrs(): HTMLAttributeTuple[] { return [ ['cds-layout', 'align:top'], ['slot', 'close-button'], ['aria-label', this.i18n.closeButtonAriaLabel], ['icon-size', '24'], ]; } protected isScrollable = false; private get modalFooterTemplate(): TemplateResult { if (this.modalFooter) { return html`<div cds-layout="align-stretch p-x:lg p-b:lg"> <slot name="modal-actions"></slot> </div>`; } else { return html``; } } protected observers: (MutationObserver | ResizeObserver)[] = []; // modal-body requires a tab index so it can be scrolled render() { return html` ${this.backdropTemplate} <div class="modal-dialog private-host" tabindex="-1" cds-layout="m:md m@md:xl"> <div cds-layout="display:screen-reader-only">${this.i18n.contentStart}</div> <div class="modal-content" cds-layout="vertical gap:sm gap@md:lg align:stretch"> <div cds-layout="horizontal gap:sm wrap:none align:vertical-center p-x:lg p-t:lg"> <div> <slot name="modal-header"></slot> </div> <div cds-layout="align:right"> <slot name="modal-header-actions"></slot> </div> ${this.closable ? this.closeButtonTemplate : ''} </div> <div class="modal-body" cds-layout="p-x:lg"> <slot></slot> </div> ${this.modalFooterTemplate} </div> <div cds-layout="display:screen-reader-only">${this.i18n.contentEnd}</div> </div> `; } connectedCallback() { super.connectedCallback(); this.observers.push(getElementUpdates(this, 'hidden', () => this.setScrollableProperties())); } disconnectedCallback() { super.disconnectedCallback(); this.observers.forEach(o => o.disconnect()); } private async setScrollableProperties() { if (this.hidden === false) { await this.updateComplete; // wait until after render to measure if scrollable this.isScrollable = isScrollable(this.content); this.content.tabIndex = this.isScrollable ? 0 : -1; this.content.ariaLabel = this.isScrollable ? this.i18n.contentBox : null; } } } ```
/content/code_sandbox/packages/core/src/modal/modal.element.ts
xml
2016-09-29T17:24:17
2024-08-11T17:06:15
clarity
vmware-archive/clarity
6,431
1,251
```xml import { AsyncIterableX } from '../../asynciterable/asynciterablex.js'; import { retry } from '../../asynciterable/operators/retry.js'; /** * @ignore */ export function retryProto<T>(this: AsyncIterableX<T>, count = -1): AsyncIterableX<T> { return retry<T>(count)(this); } AsyncIterableX.prototype.retry = retryProto; declare module '../../asynciterable/asynciterablex' { interface AsyncIterableX<T> { retry: typeof retryProto; } } ```
/content/code_sandbox/src/add/asynciterable-operators/retry.ts
xml
2016-02-22T20:04:19
2024-08-09T18:46:41
IxJS
ReactiveX/IxJS
1,319
113
```xml import Button from "@erxes/ui/src/components/Button"; import ControlLabel from "@erxes/ui/src/components/form/Label"; import FormControl from "@erxes/ui/src/components/form/Control"; import FormGroup from "@erxes/ui/src/components/form/Group"; import { INTEGRATION_KINDS } from "@erxes/ui/src/constants/integrations"; import { IntegrationMutationVariables } from "../../types"; import { ModalFooter } from "@erxes/ui/src/styles/main"; import React from "react"; import SelectBrand from "../../containers/SelectBrand"; import SelectChannels from "../../containers/SelectChannels"; import { __ } from "@erxes/ui/src/utils"; import { loadDynamicComponent } from "@erxes/ui/src/utils/core"; type CommonTypes = { name: string; brandId: string; channelIds: string[]; webhookData: any; isSubmitted: boolean; details: any; }; type Props = { integrationId: string; integrationKind: string; name: string; brandId: string; channelIds: string[]; webhookData: any; details: any; onSubmit: ( id: string, { name, brandId, channelIds, details }: IntegrationMutationVariables, callback: () => void ) => void; closeModal: () => void; }; class CommonFieldForm extends React.PureComponent<Props, CommonTypes> { constructor(props: Props) { super(props); this.state = { name: props.name || "", brandId: props.brandId || "", channelIds: props.channelIds || [], webhookData: props.webhookData || {}, details: props.details || {}, isSubmitted: false, }; } renderScript = () => { const { integrationKind } = this.props; if (integrationKind !== INTEGRATION_KINDS.WEBHOOK) { return null; } const { webhookData } = this.state; const onChangeWebhookData = (e) => { webhookData[e.target.name] = e.target.value; this.setState({ webhookData: { ...webhookData }, }); }; return ( <> <FormGroup> <ControlLabel required={false}>Token</ControlLabel> <FormControl name="token" required={false} autoFocus={false} defaultValue={webhookData.token} onChange={onChangeWebhookData} /> </FormGroup> <FormGroup> <ControlLabel required={false}>Origin</ControlLabel> <FormControl name="origin" required={false} autoFocus={false} defaultValue={webhookData.origin} onChange={onChangeWebhookData} /> </FormGroup> <FormGroup> <ControlLabel required={false}>{__("Script")}</ControlLabel> <FormControl name="script" componentclass="textarea" required={true} defaultValue={webhookData.script} onChange={onChangeWebhookData} /> </FormGroup> </> ); }; render() { const { integrationId, onSubmit, closeModal } = this.props; const { name, brandId, channelIds, webhookData, details } = this.state; const onBrandChange = (e) => { this.setState({ brandId: e.target.value }); }; const onChannelChange = (values: string[]) => { this.setState({ channelIds: values }); }; const onDetailsChange = (key: string, value: any) => { this.setState({ details: { ...details, [key]: value } }); }; const onNameBlur = (e) => { this.setState({ name: e.target.value }); }; const saveIntegration = (e) => { e.preventDefault(); this.setState({ isSubmitted: true }); let data: any; switch (this.props.integrationKind) { case "webhook": { data = webhookData; break; } } onSubmit(integrationId, { name, brandId, channelIds, details }, () => { this.setState({ isSubmitted: false }); closeModal(); }); }; return ( <> <FormGroup> <ControlLabel required={true}>{__("Name")}</ControlLabel> <FormControl required={true} defaultValue={name} onBlur={onNameBlur} autoFocus={true} /> </FormGroup> {this.renderScript()} {loadDynamicComponent( "integrationDetailsForm", { integrationKind: this.props.integrationKind, details: this.state.details, onChange: onDetailsChange, }, true )} <SelectBrand isRequired={true} defaultValue={brandId} onChange={onBrandChange} description={__( "Which specific Brand does this integration belong to?" )} /> <SelectChannels defaultValue={channelIds} isRequired={true} onChange={onChannelChange} /> <ModalFooter> <Button btnStyle="simple" type="button" onClick={closeModal} icon="times-circle" > Cancel </Button> <Button onClick={saveIntegration} type="submit" btnStyle="success" icon="check-circle" > {__("Save")} </Button> </ModalFooter> </> ); } } export default CommonFieldForm; ```
/content/code_sandbox/packages/ui-inbox/src/settings/integrations/components/common/CommonFieldForm.tsx
xml
2016-11-11T06:54:50
2024-08-16T10:26:06
erxes
erxes/erxes
3,479
1,150
```xml /* * @license Apache-2.0 * * * * path_to_url * * Unless required by applicable law or agreed to in writing, software * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ // TypeScript Version: 4.1 /** * Computes the arcsine (in degrees) of a double-precision floating-point number. * * @param x - input value * @returns arcsine (in degrees) * * @example * var v = asind( 0.0 ); * // returns 0.0 * * @example * var v = asind( 0.5 ); * // returns ~30.0 * * @example * var sqrt = require( '@stdlib/math/base/special/sqrt' ); * * var v = asindf( sqrt( 2.0 ) / 2.0 ); * // returns ~45.0 * * @example * var sqrt = require( '@stdlib/math/base/special/sqrt' ); * ** var v = asindf( sqrt( 3.0 ) / 2.0 ); * // returns ~60.0 * * @example * var v = asind( NaN ); * // returns NaN */ declare function asind( x: number ): number; // EXPORTS // export = asind; ```
/content/code_sandbox/lib/node_modules/@stdlib/math/base/special/asind/docs/types/index.d.ts
xml
2016-03-24T04:19:52
2024-08-16T09:03:19
stdlib
stdlib-js/stdlib
4,266
288
```xml import { Meta } from '@storybook/react'; import { Image } from '@fluentui/react-northstar'; import ImageExampleRtl from '../../examples/components/Image/Rtl/ImageExample.rtl'; import ImageExample from '../../examples/components/Image/Types/ImageExample.shorthand'; import ImageExampleAvatar from '../../examples/components/Image/Types/ImageExampleAvatar.shorthand'; import ImageExampleCircular from '../../examples/components/Image/Variations/ImageExampleCircular'; import ImageExampleFluent from '../../examples/components/Image/Variations/ImageExampleFluid'; export default { component: Image, title: 'Image' } as Meta<typeof Image>; export { ImageExampleRtl, ImageExample, ImageExampleAvatar, ImageExampleCircular, ImageExampleFluent }; ```
/content/code_sandbox/packages/fluentui/docs/src/vr-tests/Image/Image.stories.tsx
xml
2016-06-06T15:03:44
2024-08-16T18:49:29
fluentui
microsoft/fluentui
18,221
147
```xml import { Range, TextEditor } from 'vscode'; import { IDocumentManager } from '../../client/common/application/types'; export interface IMockTextEditor extends TextEditor {} export interface IMockDocumentManager extends IDocumentManager { changeDocument(file: string, changes: { range: Range; newText: string }[]): void; } ```
/content/code_sandbox/src/test/mocks/mockTypes.ts
xml
2016-01-19T10:50:01
2024-08-12T21:05:24
pythonVSCode
DonJayamanne/pythonVSCode
2,078
69
```xml <?xml version="1.0" encoding="UTF-8"?> <ui version="4.0"> <class>CADtexturingControl</class> <widget class="QDockWidget" name="CADtexturingControl"> <property name="geometry"> <rect> <x>0</x> <y>0</y> <width>173</width> <height>87</height> </rect> </property> <property name="windowTitle"> <string>CADtexturingControl</string> </property> <widget class="QWidget" name="dockWidgetContents"> <widget class="QPushButton" name="saverendering"> <property name="enabled"> <bool>true</bool> </property> <property name="geometry"> <rect> <x>40</x> <y>10</y> <width>71</width> <height>23</height> </rect> </property> <property name="toolTip"> <string>save rendering from the camera of the currently selected raster layer</string> </property> <property name="text"> <string>save view</string> </property> <property name="default"> <bool>false</bool> </property> </widget> <widget class="QCheckBox" name="render_edges"> <property name="geometry"> <rect> <x>40</x> <y>40</y> <width>101</width> <height>17</height> </rect> </property> <property name="toolTip"> <string>crease angle edge render mode</string> </property> <property name="text"> <string>render edges</string> </property> </widget> </widget> </widget> <resources/> <connections/> </ui> ```
/content/code_sandbox/unsupported/plugins_experimental/edit_CADtexturing/CADtexturingControl.ui
xml
2016-11-07T00:03:21
2024-08-16T16:55:49
meshlab
cnr-isti-vclab/meshlab
4,633
418
```xml import { CommandObject } from '../view/CommandAbstract'; export interface CommandsConfig { /** * Style prefix * @default 'com-' */ stylePrefix?: string; /** * Default commands * @default {} */ defaults?: Record<string, CommandObject>; /** * If true, stateful commands (with `run` and `stop` methods) can't be executed multiple times. * If the command is already active, running it again will not execute the `run` method. * @default true */ strict?: boolean; } const config: CommandsConfig = { stylePrefix: 'com-', defaults: {}, strict: true, }; export default config; ```
/content/code_sandbox/src/commands/config/config.ts
xml
2016-01-22T00:23:19
2024-08-16T11:20:59
grapesjs
GrapesJS/grapesjs
21,687
156
```xml import React from 'react'; type IconProps = React.SVGProps<SVGSVGElement>; export declare const IcFolders: (props: IconProps) => React.JSX.Element; export {}; ```
/content/code_sandbox/packages/icons/lib/icFolders.d.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
42
```xml /** * @license * * path_to_url * * Unless required by applicable law or agreed to in writing, software * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ import { BossDataSource } from "#src/datasource/boss/frontend.js"; import { registerProvider } from "#src/datasource/default_provider.js"; registerProvider( "boss", (options) => new BossDataSource(options.credentialsManager), ); ```
/content/code_sandbox/src/datasource/boss/register_default.ts
xml
2016-05-27T02:37:25
2024-08-16T07:24:25
neuroglancer
google/neuroglancer
1,045
94
```xml <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "path_to_url"> <plist version="1.0"> <dict> <key>ACPI</key> <dict> <key>DSDT</key> <dict> <key>Debug</key> <false/> <key>DropOEM_DSM</key> <false/> <key>Name</key> <string>DSDT.aml</string> <key>Patches</key> <array> <dict> <key>Comment</key> <string>change GFX0 to IGPU</string> <key>Disabled</key> <false/> <key>Find</key> <data> R0ZYMA== </data> <key>Replace</key> <data> SUdQVQ== </data> </dict> <dict> <key>Comment</key> <string>change EHC1 to EH01</string> <key>Disabled</key> <false/> <key>Find</key> <data> RUhDMQ== </data> <key>Replace</key> <data> RUgwMQ== </data> </dict> <dict> <key>Comment</key> <string>change EHC2 to EH02</string> <key>Disabled</key> <false/> <key>Find</key> <data> RUhDMg== </data> <key>Replace</key> <data> RUgwMg== </data> </dict> <dict> <key>Comment</key> <string>change HDAS to HDEF</string> <key>Disabled</key> <false/> <key>Find</key> <data> SERBUw== </data> <key>Replace</key> <data> SERFRg== </data> </dict> <dict> <key>Comment</key> <string>change SAT0 to SATA</string> <key>Disabled</key> <false/> <key>Find</key> <data> U0FUMA== </data> <key>Replace</key> <data> U0FUQQ== </data> </dict> <dict> <key>Comment</key> <string>change LPC to LPCB</string> <key>Disabled</key> <false/> <key>Find</key> <data> TFBDXw== </data> <key>Replace</key> <data> TFBDQg== </data> </dict> <dict> <key>Comment</key> <string>change HECI to IMEI</string> <key>Disabled</key> <false/> <key>Find</key> <data> SEVDSQ== </data> <key>Replace</key> <data> SU1FSQ== </data> </dict> </array> <key>ReuseFFFF</key> <false/> </dict> <key>SSDT</key> <dict> <key>DropOem</key> <false/> <key>EnableC6</key> <true/> <key>Generate</key> <dict> <key>CStates</key> <true/> <key>PStates</key> <true/> </dict> </dict> <key>SortedOrder</key> <array> <string>SSDT-XCPM.aml</string> </array> </dict> <key>Boot</key> <dict> <key>Arguments</key> <string>dart=0 -xcpm nvda_drv=1 abm_firstpolldelay=16000 slide=0 rootless=0 kext-dev-mode=1</string> <key>Debug</key> <false/> <key>DefaultVolume</key> <string>mac osx</string> <key>Legacy</key> <string>PBR</string> <key>Secure</key> <false/> <key>Timeout</key> <integer>2</integer> <key>XMPDetection</key> <false/> </dict> <key>CPU</key> <dict> <key>UseARTFrequency</key> <false/> </dict> <key>Devices</key> <dict> <key>Audio</key> <dict> <key>Inject</key> <string>3</string> </dict> <key>USB</key> <dict> <key>AddClockID</key> <true/> <key>FixOwnership</key> <true/> <key>Inject</key> <true/> </dict> <key>UseIntelHDMI</key> <true/> </dict> <key>DisableDrivers</key> <array> <string>Nothing</string> </array> <key>GUI</key> <dict> <key>Hide</key> <array> <string>Preboot</string> </array> <key>Language</key> <string>zh_CN:0</string> <key>Mouse</key> <dict> <key>DoubleClick</key> <integer>500</integer> <key>Enabled</key> <true/> <key>Mirror</key> <false/> <key>Speed</key> <integer>8</integer> </dict> <key>Scan</key> <dict> <key>Entries</key> <true/> <key>Legacy</key> <false/> <key>Linux</key> <false/> <key>Tool</key> <true/> </dict> <key>Theme</key> <string>YosemiteLogin</string> </dict> <key>Graphics</key> <dict> <key>EDID</key> <dict> <key>Custom</key> <data> AP///////wAw5HoEAAAAAAAXAQSVHxF46kV1oFtVkicMUFQAAAAB AQEBAQEBAQEBAQEBAQEBLjaAoHA4H0AwZDUANa4QAAAaAAAAAAAA AAAAAAAAAAAAAAAAAAAA/gBMRyBEaXNwbGF5CiAgAAAA/gBMUDE0 MFdGMy1TUEwyAC8= </data> <key>Inject</key> <true/> </dict> <key>Inject</key> <dict> <key>ATI</key> <false/> <key>Intel</key> <true/> <key>NVidia</key> <false/> </dict> <key>NvidiaSingle</key> <false/> <key>ig-platform-id</key> <string>0x16160002</string> </dict> <key>KernelAndKextPatches</key> <dict> <key>AppleIntelCPUPM</key> <true/> <key>AppleRTC</key> <true/> <key>Debug</key> <false/> <key>KernelCpu</key> <false/> <key>KernelLapic</key> <false/> <key>KernelPm</key> <true/> <key>KernelXCPM</key> <false/> <key>KextsToPatch</key> <array> <dict> <key>Comment</key> <string>Disable minStolenSize less or equal fStolenMemorySize assertion, 10.12.0 ( (based on Austere.J patch)</string> <key>Disabled</key> <false/> <key>Find</key> <data> iUXIOcd2Tw== </data> <key>InfoPlistPatch</key> <false/> <key>MatchOS</key> <string>10.12.x</string> <key>Name</key> <string>AppleIntelBDWGraphicsFramebuffer</string> <key>Replace</key> <data> iUXIOcfrTw== </data> </dict> <dict> <key>Comment</key> <string>AirPortBrcm4360 Patch 1</string> <key>Disabled</key> <false/> <key>Find</key> <data> QTnEdRs= </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AirPortBrcm4360</string> <key>Replace</key> <data> QTnEZpA= </data> </dict> <dict> <key>Comment</key> <string>AirPortBrcm4360 Patch 3</string> <key>Disabled</key> <false/> <key>Find</key> <data> g33EBHQG </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AirPortBrcm4360</string> <key>Replace</key> <data> g33EBGaQ </data> </dict> <dict> <key>Comment</key> <string>External icons patch</string> <key>Disabled</key> <false/> <key>Find</key> <data> RXh0ZXJuYWw= </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AppleAHCIPort</string> <key>Replace</key> <data> SW50ZXJuYWw= </data> </dict> <dict> <key>Comment</key> <string>94352xyao</string> <key>Disabled</key> <false/> <key>Find</key> <data> gflSqgAAdSk= </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AirPortBrcm4360</string> <key>Replace</key> <data> gflSqgAAZpA= </data> </dict> <dict> <key>Comment</key> <string>AirPort Extreme</string> <key>Disabled</key> <false/> <key>Find</key> <data> axAAAHUN </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AirPortBrcm4360</string> <key>Replace</key> <data> axAAAJCQ </data> </dict> <dict> <key>Comment</key> <string>AirPortBrcm4360 Patch 2</string> <key>Disabled</key> <false/> <key>Find</key> <data> QQ+3zTnBdQw= </data> <key>InfoPlistPatch</key> <false/> <key>Name</key> <string>AirPortBrcm4360</string> <key>Replace</key> <data> QQ+3zTnBZpA= </data> </dict> </array> </dict> <key>RtVariables</key> <dict> <key>BooterConfig</key> <string>0x28</string> <key>CsrActiveConfig</key> <string>0x67</string> <key>MLB</key> <string>C02722100CDDJWKA8</string> <key>ROM</key> <data> jFVY0hhT </data> </dict> <key>SMBIOS</key> <dict> <key>BiosReleaseDate</key> <string>08/07/2017</string> <key>BiosVendor</key> <string>Apple Inc.</string> <key>BiosVersion</key> <string>MBA71.88Z.0171.B00.1708072210</string> <key>Board-ID</key> <string>Mac-937CB26E2E02BB01</string> <key>BoardManufacturer</key> <string>Apple Inc.</string> <key>BoardSerialNumber</key> <string>C02722100CDDJWKA8</string> <key>BoardType</key> <integer>10</integer> <key>BoardVersion</key> <string>1.0</string> <key>ChassisAssetTag</key> <string>Air-Enclosure</string> <key>ChassisManufacturer</key> <string>Apple Inc.</string> <key>ChassisType</key> <string>0x09</string> <key>Family</key> <string>MacBook Air</string> <key>FirmwareFeatures</key> <string>0xE00FE137</string> <key>FirmwareFeaturesMask</key> <string>0xFF1FFF3F</string> <key>LocationInChassis</key> <string>Part Component</string> <key>Manufacturer</key> <string>Apple Inc.</string> <key>Mobile</key> <true/> <key>PlatformFeature</key> <string>0xFFFF</string> <key>ProductName</key> <string>MacBookAir7,2</string> <key>SerialNumber</key> <string>C02TT2AIG940</string> <key>SmUUID</key> <string>D058C7C8-86A9-58C7-8843-0A2A11D21853</string> <key>Version</key> <string>1.0</string> </dict> <key>SystemParameters</key> <dict> <key>CustomUUID</key> <string>951B54C7-2FE4-4F7F-9229-84EE676FD592</string> <key>InjectKexts</key> <string>Yes</string> <key>InjectSystemID</key> <true/> </dict> </dict> </plist> ```
/content/code_sandbox/Clover-Configs/Dell/Dell Inspiron 15 3543/CLOVER/config.plist
xml
2016-11-05T04:22:54
2024-08-12T19:25:53
Hackintosh-Installer-University
huangyz0918/Hackintosh-Installer-University
3,937
3,725
```xml <View id="root" frame="0, 0, sys.contW, sys.contH" css="{flex-direction='column'}" bg="0xeeeeee" > <View css="{height=sys.contH/11}" bg="0x004B97"> <Text css="{flex=1, margin=10}" text="Local Image" fontSize="20" textColor="0xffffff"></Text> </View> <View css="{flex=1, justify-content='center', align-items='center'}"> <Image css="{height=sys.contW/4, width=sys.contW/4}" image="luaview.png"></Image> </View> <View css="{height=sys.contH/11}" bg="0x004B97"> <Text css="{flex=1, margin=10}" text="Http Image" fontSize="20" textColor="0xffffff"></Text> </View> <View css="{flex=1, justify-content='center', align-items='center'}"> <Image css="{height=sys.contW/5, width=sys.contW/5}" image="path_to_url"></Image> </View> <View css="{height=sys.contH/11}" bg="0x004B97"> <Text css="{flex=1, margin=10}" text="Gif Image" fontSize="20" textColor="0xffffff"></Text> </View> <View css="{flex=1, justify-content='center', align-items='center'}"> <Image css="{height=sys.contW/6, width=sys.contW/6}" image="path_to_url"></Image> </View> </View> ```
/content/code_sandbox/IOS/luaviewEx/Example/luaviewEx/playground/widget/image.xml
xml
2016-01-07T08:55:50
2024-08-16T13:34:26
LuaViewSDK
alibaba/LuaViewSDK
3,733
353
```xml import { FlexItem, LeftItem } from "@erxes/ui/src/components/step/styles"; import ControlLabel from "@erxes/ui/src/components/form/Label"; import { FlexRow } from "@erxes/ui-inbox/src/settings/integrations/styles"; import FormControl from "@erxes/ui/src/components/form/Control"; import FormGroup from "@erxes/ui/src/components/form/Group"; import React from "react"; import { __ } from "coreui/utils"; type Props = { onChange: ( name: "title" | "location" | "duration" | "cancellationPolicy", value: string | number ) => void; title?: string; location?: string; duration?: number; cancellationPolicy?: string; }; type State = { title?: string; location?: string; duration?: number; cancellationPolicy?: string; }; class Event extends React.Component<Props, State> { constructor(props: Props) { super(props); const { duration } = props; this.state = { title: "", location: "", duration: duration || 45, }; } onChangeInput = ( name: "title" | "location" | "duration" | "cancellationPolicy", e: React.FormEvent ) => { const val = (e.target as HTMLInputElement).value; const value = name === "duration" ? parseInt(val, 10) : val; this.setState({ [name]: value }, () => this.props.onChange(name, value)); }; render() { const { title, location, duration, cancellationPolicy } = this.props; return ( <FlexItem> <LeftItem> <FormGroup> <ControlLabel>Event title</ControlLabel> <FormControl placeholder={__("Write here Event title") + "."} rows={3} value={title} onChange={this.onChangeInput.bind(null, "title")} /> </FormGroup> <FormGroup> <ControlLabel>Event location</ControlLabel> <FormControl placeholder={__("Write here Event location") + "."} rows={3} value={location} onChange={this.onChangeInput.bind(null, "location")} /> </FormGroup> <FlexRow> <div className="flex-item"> <FormGroup> <ControlLabel>Duration</ControlLabel> <FormControl value={duration} name="duration" onChange={this.onChangeInput.bind(null, "duration")} componentclass="select" > <option value={15}>15</option> <option value={30}>30</option> <option value={45}>45</option> <option value={60}>60</option> <option value={75}>75</option> <option value={90}>90</option> </FormControl> </FormGroup> </div> <div className="flex-item" /> <div className="flex-item" /> </FlexRow> <FormGroup> <ControlLabel>Cancellation Policy</ControlLabel> <FormControl componentclass="textarea" rows={3} value={cancellationPolicy} onChange={this.onChangeInput.bind(null, "cancellationPolicy")} /> </FormGroup> </LeftItem> </FlexItem> ); } } export default Event; ```
/content/code_sandbox/packages/plugin-calendar-ui/src/settings/components/scheduler/steps/Event.tsx
xml
2016-11-11T06:54:50
2024-08-16T10:26:06
erxes
erxes/erxes
3,479
714
```xml import * as compose from "lodash.flowright"; import { Alert, confirm, withProps } from "@erxes/ui/src/utils"; import { ResolveAllMutationResponse, ResolveAllMutationVariables, } from "@erxes/ui-inbox/src/inbox/types"; import { getConfig, refetchSidebarConversationsOptions, setConfig, } from "@erxes/ui-inbox/src/inbox/utils"; import { mutations, queries } from "@erxes/ui-inbox/src/inbox/graphql"; import { AppConsumer } from "coreui/appContext"; import Bulk from "@erxes/ui/src/components/Bulk"; import DumbSidebar from "../../components/leftSidebar/Sidebar"; import { IBulkContentProps } from "@erxes/ui/src/components/Bulk"; import { InboxManagementActionConsumer } from "../InboxCore"; import React from "react"; import { gql } from "@apollo/client"; import { graphql } from "@apollo/client/react/hoc"; type Props = { queryParams: any; currentConversationId?: string; }; type FinalProps = Props & ResolveAllMutationResponse; const STORAGE_KEY = "erxes_additional_sidebar_config"; class Sidebar extends React.Component<FinalProps> { toggle = ({ isOpen }: { isOpen: boolean }) => { const config = getConfig(STORAGE_KEY); config.showAddition = isOpen; setConfig(STORAGE_KEY, config); }; // resolve all conversation resolveAll = (notifyHandler) => () => { const message = "Are you sure you want to resolve all conversations?"; confirm(message).then(() => { this.props .resolveAllMutation({ variables: this.props.queryParams }) .then(() => { if (notifyHandler) { notifyHandler(); } Alert.success("The conversation has been resolved!"); }) .catch((e) => { Alert.error(e.message); }); }); }; render() { if (!localStorage.getItem(STORAGE_KEY)) { setConfig(STORAGE_KEY, { showAddition: false, showChannels: true, showBrands: false, showIntegrations: false, showTags: false, showSegments: false, }); } const { currentConversationId, queryParams } = this.props; const content = ({ bulk, toggleBulk, emptyBulk }: IBulkContentProps) => { return ( <AppConsumer> {({ currentUser }) => ( <InboxManagementActionConsumer> {({ notifyConsumersOfManagementAction }) => ( <DumbSidebar currentUser={currentUser} currentConversationId={currentConversationId} queryParams={queryParams} bulk={bulk} emptyBulk={emptyBulk} toggleBulk={toggleBulk} config={getConfig(STORAGE_KEY)} toggleSidebar={this.toggle} resolveAll={this.resolveAll( notifyConsumersOfManagementAction )} /> )} </InboxManagementActionConsumer> )} </AppConsumer> ); }; return <Bulk content={content} />; } } export default withProps<Props>( compose( graphql<Props, ResolveAllMutationResponse, ResolveAllMutationVariables>( gql(mutations.resolveAll), { name: "resolveAllMutation", options: () => refetchSidebarConversationsOptions(), } ) )(Sidebar) ); ```
/content/code_sandbox/packages/plugin-inbox-ui/src/inbox/containers/leftSidebar/Sidebar.tsx
xml
2016-11-11T06:54:50
2024-08-16T10:26:06
erxes
erxes/erxes
3,479
703
```xml /* * @license Apache-2.0 * * * * path_to_url * * Unless required by applicable law or agreed to in writing, software * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ // TypeScript Version: 4.1 /// <reference types="@stdlib/types"/> import { TypedIterator, TypedIterableIterator } from '@stdlib/types/iter'; import { ArrayLike } from '@stdlib/types/array'; import { typedndarray } from '@stdlib/types/ndarray'; // Define a union type representing both iterable and non-iterable iterators: type Iterator<T> = TypedIterator<T> | TypedIterableIterator<T>; /** * Interface defining function options. */ interface Options { /** * Boolean indicating whether returned views should be read-only (default: true). * * ## Notes * * - If the input array is read-only, setting this option to `false` raises an exception. */ readonly?: boolean; } /** * Returns an iterator which iterates over each subarray in a stack of subarrays according to a list of specified stack dimensions. * * @param x - input value * @param dims - indices of dimensions to stack * @param options - function options * @param options.readonly - boolean indicating whether returned views should be read-only * @returns iterator * * @example * var array = require( '@stdlib/ndarray/array' ); * var ndarray2array = require( '@stdlib/ndarray/to-array' ); * * var x = array( [ [ [ 1, 2 ], [ 3, 4 ] ], [ [ 5, 6 ], [ 7, 8 ] ] ], { * 'dtype': 'float64' * }); * // returns <ndarray> * * var iter = nditerStacks( x, [ 1, 2 ] ); * * var v = iter.next().value; * // returns <ndarray> * * var arr = ndarray2array( v ); * // returns [ [ 1, 2 ], [ 3, 4 ] ] * * v = iter.next().value; * // returns <ndarray> * * arr = ndarray2array( v ); * // returns [ [ 5, 6 ], [ 7, 8 ] ] * * // ... */ declare function nditerStacks<T = unknown>( x: typedndarray<T>, dims: ArrayLike<number>, options?: Options ): Iterator<typedndarray<T>>; // EXPORTS // export = nditerStacks; ```
/content/code_sandbox/lib/node_modules/@stdlib/ndarray/iter/stacks/docs/types/index.d.ts
xml
2016-03-24T04:19:52
2024-08-16T09:03:19
stdlib
stdlib-js/stdlib
4,266
543
```xml import {getSpec, Post, Returns, SpecTypes} from "@tsed/schema"; import {Controller} from "@tsed/di"; import {Pagination} from "../models/Pagination"; import {Product} from "../models/Product"; @Controller("/") class MyController { @Post("/") @Returns(200, Pagination).Of(Product).Description("description") async method(): Promise<Pagination<Product> | null> { return null; } } const spec = getSpec(MyController, {specType: SpecTypes.OPENAPI}); console.log(spec); ```
/content/code_sandbox/docs/docs/snippets/model/get-spec-generics-controller1.ts
xml
2016-02-21T18:38:47
2024-08-14T21:19:48
tsed
tsedio/tsed
2,817
115
```xml import { Measure } from "../entities/measure/Measure" import { SongProvider } from "../song/SongProvider" export default class Quantizer { private denominator: number private songStore: SongProvider private isEnabled: boolean = true constructor( songStore: SongProvider, denominator: number, isEnabled: boolean, ) { this.songStore = songStore // N N // n-remnant note n this.denominator = denominator this.isEnabled = isEnabled } private get timebase() { return this.songStore.song.timebase } private calc(tick: number, fn: (tick: number) => number) { if (!this.isEnabled) { return Math.round(tick) } const measureStart = Measure.getMeasureStart( this.songStore.song.measures, tick, this.songStore.song.timebase, ) const beats = this.denominator === 1 ? measureStart.numerator ?? 4 : 4 const u = (this.timebase * beats) / this.denominator const offset = measureStart?.tick ?? 0 return fn((tick - offset) / u) * u + offset } round(tick: number) { return this.calc(tick, Math.round) } ceil(tick: number) { return this.calc(tick, Math.ceil) } floor(tick: number) { return this.calc(tick, Math.floor) } get unit() { return (this.timebase * 4) / this.denominator } } ```
/content/code_sandbox/app/src/quantizer/Quantizer.ts
xml
2016-03-06T15:19:53
2024-08-15T14:27:10
signal
ryohey/signal
1,238
349
```xml <?xml version="1.0" encoding="UTF-8"?> <resources> <dimen name="activity_horizontal_margin">32.0000dp</dimen> <dimen name="activity_vertical_margin">32.0000dp</dimen> <dimen name="heart_anim_bezier_x_rand">80.0000dp</dimen> <dimen name="heart_anim_init_x">100.0000dp</dimen> <dimen name="heart_anim_init_y">50.0000dp</dimen> <dimen name="heart_anim_length">200.0000dp</dimen> <dimen name="heart_anim_length_rand">300.0000dp</dimen> <dimen name="heart_anim_x_point_factor">60.0000dp</dimen> <dimen name="heart_size_height">54.6000dp</dimen> <dimen name="heart_size_width">65.0000dp</dimen> <dimen name="textSize_sidebar">20.0000sp</dimen> <dimen name="large_textSize_sidebar">64.0000sp</dimen> <dimen name="textSize_sidebar_choose">24.0000sp</dimen> <dimen name="textSize_sidebar_padding">40.0000sp</dimen> <dimen name="radius_sidebar">40.0000dp</dimen> <dimen name="ball_radius_sidebar">48.0000dp</dimen> <dimen name="default_slider_height">72.0000dp</dimen> <dimen name="default_slider_margin">48.0000dp</dimen> <dimen name="default_slider_bar_height">8.0000dp</dimen> <dimen name="default_slider_handler_radius">20.0000dp</dimen> <dimen name="default_padding_side">48.0000dp</dimen> <dimen name="default_preview_height">80.0000dp</dimen> <dimen name="default_preview_image_height">72.0000dp</dimen> <dimen name="default_slider_margin_btw_title">40.0000dp</dimen> <dimen name="rxauto_imageview_left">-200.0000dp</dimen> <dimen name="rxauto_imageview_Right">-600.0000dp</dimen> <dimen name="sp_1">2.0000sp</dimen> <dimen name="sp_2">4.0000sp</dimen> <dimen name="sp_3">6.0000sp</dimen> <dimen name="sp_4">8.0000sp</dimen> <dimen name="sp_5">10.0000sp</dimen> <dimen name="sp_6">12.0000sp</dimen> <dimen name="sp_7">14.0000sp</dimen> <dimen name="sp_8">16.0000sp</dimen> <dimen name="sp_9">18.0000sp</dimen> <dimen name="sp_10">20.0000sp</dimen> <dimen name="sp_11">22.0000sp</dimen> <dimen name="sp_12">24.0000sp</dimen> <dimen name="sp_13">26.0000sp</dimen> <dimen name="sp_14">28.0000sp</dimen> <dimen name="sp_15">30.0000sp</dimen> <dimen name="sp_16">32.0000sp</dimen> <dimen name="sp_17">34.0000sp</dimen> <dimen name="sp_18">36.0000sp</dimen> <dimen name="sp_19">38.0000sp</dimen> <dimen name="sp_20">40.0000sp</dimen> <dimen name="sp_21">42.0000sp</dimen> <dimen name="sp_22">44.0000sp</dimen> <dimen name="sp_23">46.0000sp</dimen> <dimen name="sp_24">48.0000sp</dimen> <dimen name="sp_25">50.0000sp</dimen> <dimen name="sp_26">52.0000sp</dimen> <dimen name="sp_27">54.0000sp</dimen> <dimen name="sp_28">56.0000sp</dimen> <dimen name="sp_29">58.0000sp</dimen> <dimen name="sp_30">60.0000sp</dimen> <dimen name="sp_31">62.0000sp</dimen> <dimen name="sp_32">64.0000sp</dimen> <dimen name="sp_33">66.0000sp</dimen> <dimen name="sp_34">68.0000sp</dimen> <dimen name="sp_35">70.0000sp</dimen> <dimen name="sp_36">72.0000sp</dimen> <dimen name="sp_37">74.0000sp</dimen> <dimen name="sp_38">76.0000sp</dimen> <dimen name="sp_39">78.0000sp</dimen> <dimen name="sp_40">80.0000sp</dimen> <dimen name="sp_41">82.0000sp</dimen> <dimen name="sp_42">84.0000sp</dimen> <dimen name="sp_43">86.0000sp</dimen> <dimen name="sp_44">88.0000sp</dimen> <dimen name="sp_45">90.0000sp</dimen> <dimen name="sp_46">92.0000sp</dimen> <dimen name="sp_47">94.0000sp</dimen> <dimen name="sp_48">96.0000sp</dimen> <dimen name="sp_49">98.0000sp</dimen> <dimen name="sp_50">100.0000sp</dimen> <dimen name="sp_51">102.0000sp</dimen> <dimen name="sp_52">104.0000sp</dimen> <dimen name="sp_53">106.0000sp</dimen> <dimen name="sp_54">108.0000sp</dimen> <dimen name="sp_55">110.0000sp</dimen> <dimen name="sp_56">112.0000sp</dimen> <dimen name="sp_57">114.0000sp</dimen> <dimen name="sp_58">116.0000sp</dimen> <dimen name="sp_59">118.0000sp</dimen> <dimen name="sp_60">120.0000sp</dimen> <dimen name="sp_61">122.0000sp</dimen> <dimen name="sp_62">124.0000sp</dimen> <dimen name="sp_63">126.0000sp</dimen> <dimen name="sp_64">128.0000sp</dimen> <dimen name="sp_65">130.0000sp</dimen> <dimen name="sp_66">132.0000sp</dimen> <dimen name="sp_67">134.0000sp</dimen> <dimen name="sp_68">136.0000sp</dimen> <dimen name="sp_69">138.0000sp</dimen> <dimen name="sp_70">140.0000sp</dimen> <dimen name="sp_71">142.0000sp</dimen> <dimen name="sp_72">144.0000sp</dimen> <dimen name="sp_73">146.0000sp</dimen> <dimen name="sp_74">148.0000sp</dimen> <dimen name="sp_75">150.0000sp</dimen> <dimen name="sp_76">152.0000sp</dimen> <dimen name="sp_77">154.0000sp</dimen> <dimen name="sp_78">156.0000sp</dimen> <dimen name="sp_79">158.0000sp</dimen> <dimen name="sp_80">160.0000sp</dimen> <dimen name="sp_81">162.0000sp</dimen> <dimen name="sp_82">164.0000sp</dimen> <dimen name="sp_83">166.0000sp</dimen> <dimen name="sp_84">176.0000sp</dimen> <dimen name="sp_85">170.0000sp</dimen> <dimen name="sp_86">172.0000sp</dimen> <dimen name="sp_87">174.0000sp</dimen> <dimen name="sp_88">176.0000sp</dimen> <dimen name="sp_89">178.0000sp</dimen> <dimen name="sp_90">180.0000sp</dimen> <dimen name="sp_91">182.0000sp</dimen> <dimen name="sp_92">184.0000sp</dimen> <dimen name="sp_93">186.0000sp</dimen> <dimen name="sp_94">188.0000sp</dimen> <dimen name="sp_95">190.0000sp</dimen> <dimen name="sp_96">192.0000sp</dimen> <dimen name="sp_97">194.0000sp</dimen> <dimen name="sp_98">196.0000sp</dimen> <dimen name="sp_99">198.0000sp</dimen> <dimen name="sp_100">200.0000sp</dimen> <dimen name="dp_1">2.0000dp</dimen> <dimen name="dp_2">4.0000dp</dimen> <dimen name="dp_3">6.0000dp</dimen> <dimen name="dp_4">8.0000dp</dimen> <dimen name="dp_5">10.0000dp</dimen> <dimen name="dp_6">12.0000dp</dimen> <dimen name="dp_7">14.0000dp</dimen> <dimen name="dp_8">16.0000dp</dimen> <dimen name="dp_9">18.0000dp</dimen> <dimen name="dp_10">20.0000dp</dimen> <dimen name="dp_11">22.0000dp</dimen> <dimen name="dp_12">24.0000dp</dimen> <dimen name="dp_13">26.0000dp</dimen> <dimen name="dp_14">28.0000dp</dimen> <dimen name="dp_15">30.0000dp</dimen> <dimen name="dp_16">32.0000dp</dimen> <dimen name="dp_17">34.0000dp</dimen> <dimen name="dp_18">36.0000dp</dimen> <dimen name="dp_19">38.0000dp</dimen> <dimen name="dp_20">40.0000dp</dimen> <dimen name="dp_21">42.0000dp</dimen> <dimen name="dp_22">44.0000dp</dimen> <dimen name="dp_23">46.0000dp</dimen> <dimen name="dp_24">48.0000dp</dimen> <dimen name="dp_25">50.0000dp</dimen> <dimen name="dp_26">52.0000dp</dimen> <dimen name="dp_27">54.0000dp</dimen> <dimen name="dp_28">56.0000dp</dimen> <dimen name="dp_29">58.0000dp</dimen> <dimen name="dp_30">60.0000dp</dimen> <dimen name="dp_31">62.0000dp</dimen> <dimen name="dp_32">64.0000dp</dimen> <dimen name="dp_33">66.0000dp</dimen> <dimen name="dp_34">68.0000dp</dimen> <dimen name="dp_35">70.0000dp</dimen> <dimen name="dp_36">72.0000dp</dimen> <dimen name="dp_37">74.0000dp</dimen> <dimen name="dp_38">76.0000dp</dimen> <dimen name="dp_39">78.0000dp</dimen> <dimen name="dp_40">80.0000dp</dimen> <dimen name="dp_41">82.0000dp</dimen> <dimen name="dp_42">84.0000dp</dimen> <dimen name="dp_43">86.0000dp</dimen> <dimen name="dp_44">88.0000dp</dimen> <dimen name="dp_45">90.0000dp</dimen> <dimen name="dp_46">92.0000dp</dimen> <dimen name="dp_47">94.0000dp</dimen> <dimen name="dp_48">96.0000dp</dimen> <dimen name="dp_49">98.0000dp</dimen> <dimen name="dp_50">100.0000dp</dimen> <dimen name="dp_51">102.0000dp</dimen> <dimen name="dp_52">104.0000dp</dimen> <dimen name="dp_53">106.0000dp</dimen> <dimen name="dp_54">108.0000dp</dimen> <dimen name="dp_55">110.0000dp</dimen> <dimen name="dp_56">112.0000dp</dimen> <dimen name="dp_57">114.0000dp</dimen> <dimen name="dp_58">116.0000dp</dimen> <dimen name="dp_59">118.0000dp</dimen> <dimen name="dp_60">120.0000dp</dimen> <dimen name="dp_61">122.0000dp</dimen> <dimen name="dp_62">124.0000dp</dimen> <dimen name="dp_63">126.0000dp</dimen> <dimen name="dp_64">128.0000dp</dimen> <dimen name="dp_65">130.0000dp</dimen> <dimen name="dp_66">132.0000dp</dimen> <dimen name="dp_67">134.0000dp</dimen> <dimen name="dp_68">136.0000dp</dimen> <dimen name="dp_69">138.0000dp</dimen> <dimen name="dp_70">140.0000dp</dimen> <dimen name="dp_71">142.0000dp</dimen> <dimen name="dp_72">144.0000dp</dimen> <dimen name="dp_73">146.0000dp</dimen> <dimen name="dp_74">148.0000dp</dimen> <dimen name="dp_75">150.0000dp</dimen> <dimen name="dp_76">152.0000dp</dimen> <dimen name="dp_77">154.0000dp</dimen> <dimen name="dp_78">156.0000dp</dimen> <dimen name="dp_79">158.0000dp</dimen> <dimen name="dp_80">160.0000dp</dimen> <dimen name="dp_81">162.0000dp</dimen> <dimen name="dp_82">164.0000dp</dimen> <dimen name="dp_83">166.0000dp</dimen> <dimen name="dp_84">176.0000dp</dimen> <dimen name="dp_85">170.0000dp</dimen> <dimen name="dp_86">172.0000dp</dimen> <dimen name="dp_87">174.0000dp</dimen> <dimen name="dp_88">176.0000dp</dimen> <dimen name="dp_89">178.0000dp</dimen> <dimen name="dp_90">180.0000dp</dimen> <dimen name="dp_91">182.0000dp</dimen> <dimen name="dp_92">184.0000dp</dimen> <dimen name="dp_93">186.0000dp</dimen> <dimen name="dp_94">188.0000dp</dimen> <dimen name="dp_95">190.0000dp</dimen> <dimen name="dp_96">192.0000dp</dimen> <dimen name="dp_97">194.0000dp</dimen> <dimen name="dp_98">196.0000dp</dimen> <dimen name="dp_99">198.0000dp</dimen> <dimen name="dp_100">200.0000dp</dimen> <dimen name="dp_101">202.0000dp</dimen> <dimen name="dp_102">204.0000dp</dimen> <dimen name="dp_103">206.0000dp</dimen> <dimen name="dp_104">208.0000dp</dimen> <dimen name="dp_105">210.0000dp</dimen> <dimen name="dp_106">212.0000dp</dimen> <dimen name="dp_107">214.0000dp</dimen> <dimen name="dp_108">216.0000dp</dimen> <dimen name="dp_109">218.0000dp</dimen> <dimen name="dp_110">220.0000dp</dimen> <dimen name="dp_111">222.0000dp</dimen> <dimen name="dp_112">224.0000dp</dimen> <dimen name="dp_113">226.0000dp</dimen> <dimen name="dp_114">228.0000dp</dimen> <dimen name="dp_115">230.0000dp</dimen> <dimen name="dp_116">232.0000dp</dimen> <dimen name="dp_117">234.0000dp</dimen> <dimen name="dp_118">236.0000dp</dimen> <dimen name="dp_119">238.0000dp</dimen> <dimen name="dp_120">240.0000dp</dimen> <dimen name="dp_121">242.0000dp</dimen> <dimen name="dp_122">244.0000dp</dimen> <dimen name="dp_123">246.0000dp</dimen> <dimen name="dp_124">248.0000dp</dimen> <dimen name="dp_125">250.0000dp</dimen> <dimen name="dp_126">252.0000dp</dimen> <dimen name="dp_127">254.0000dp</dimen> <dimen name="dp_128">256.0000dp</dimen> <dimen name="dp_129">258.0000dp</dimen> <dimen name="dp_130">260.0000dp</dimen> <dimen name="dp_131">262.0000dp</dimen> <dimen name="dp_132">264.0000dp</dimen> <dimen name="dp_133">266.0000dp</dimen> <dimen name="dp_134">268.0000dp</dimen> <dimen name="dp_135">270.0000dp</dimen> <dimen name="dp_136">272.0000dp</dimen> <dimen name="dp_137">274.0000dp</dimen> <dimen name="dp_138">276.0000dp</dimen> <dimen name="dp_139">278.0000dp</dimen> <dimen name="dp_140">280.0000dp</dimen> <dimen name="dp_141">282.0000dp</dimen> <dimen name="dp_142">284.0000dp</dimen> <dimen name="dp_143">286.0000dp</dimen> <dimen name="dp_144">288.0000dp</dimen> <dimen name="dp_145">290.0000dp</dimen> <dimen name="dp_146">292.0000dp</dimen> <dimen name="dp_147">294.0000dp</dimen> <dimen name="dp_148">296.0000dp</dimen> <dimen name="dp_149">298.0000dp</dimen> <dimen name="dp_150">300.0000dp</dimen> <dimen name="dp_151">302.0000dp</dimen> <dimen name="dp_152">304.0000dp</dimen> <dimen name="dp_153">306.0000dp</dimen> <dimen name="dp_154">308.0000dp</dimen> <dimen name="dp_155">310.0000dp</dimen> <dimen name="dp_156">312.0000dp</dimen> <dimen name="dp_157">314.0000dp</dimen> <dimen name="dp_158">316.0000dp</dimen> <dimen name="dp_159">318.0000dp</dimen> <dimen name="dp_160">320.0000dp</dimen> <dimen name="dp_161">322.0000dp</dimen> <dimen name="dp_162">324.0000dp</dimen> <dimen name="dp_163">326.0000dp</dimen> <dimen name="dp_164">328.0000dp</dimen> <dimen name="dp_165">330.0000dp</dimen> <dimen name="dp_166">332.0000dp</dimen> <dimen name="dp_167">334.0000dp</dimen> <dimen name="dp_168">336.0000dp</dimen> <dimen name="dp_169">338.0000dp</dimen> <dimen name="dp_170">340.0000dp</dimen> <dimen name="dp_171">342.0000dp</dimen> <dimen name="dp_172">344.0000dp</dimen> <dimen name="dp_173">346.0000dp</dimen> <dimen name="dp_174">348.0000dp</dimen> <dimen name="dp_175">350.0000dp</dimen> <dimen name="dp_176">352.0000dp</dimen> <dimen name="dp_177">354.0000dp</dimen> <dimen name="dp_178">356.0000dp</dimen> <dimen name="dp_179">358.0000dp</dimen> <dimen name="dp_180">360.0000dp</dimen> <dimen name="dp_181">362.0000dp</dimen> <dimen name="dp_182">364.0000dp</dimen> <dimen name="dp_183">366.0000dp</dimen> <dimen name="dp_184">376.0000dp</dimen> <dimen name="dp_185">370.0000dp</dimen> <dimen name="dp_186">372.0000dp</dimen> <dimen name="dp_187">374.0000dp</dimen> <dimen name="dp_188">376.0000dp</dimen> <dimen name="dp_189">378.0000dp</dimen> <dimen name="dp_190">380.0000dp</dimen> <dimen name="dp_191">382.0000dp</dimen> <dimen name="dp_192">384.0000dp</dimen> <dimen name="dp_193">386.0000dp</dimen> <dimen name="dp_194">388.0000dp</dimen> <dimen name="dp_195">390.0000dp</dimen> <dimen name="dp_196">392.0000dp</dimen> <dimen name="dp_197">394.0000dp</dimen> <dimen name="dp_198">396.0000dp</dimen> <dimen name="dp_199">398.0000dp</dimen> <dimen name="dp_200">400.0000dp</dimen> <dimen name="dp_201">402.0000dp</dimen> <dimen name="dp_202">404.0000dp</dimen> <dimen name="dp_203">406.0000dp</dimen> <dimen name="dp_204">408.0000dp</dimen> <dimen name="dp_205">410.0000dp</dimen> <dimen name="dp_206">412.0000dp</dimen> <dimen name="dp_207">414.0000dp</dimen> <dimen name="dp_208">416.0000dp</dimen> <dimen name="dp_209">418.0000dp</dimen> <dimen name="dp_210">420.0000dp</dimen> <dimen name="dp_211">422.0000dp</dimen> <dimen name="dp_212">424.0000dp</dimen> <dimen name="dp_213">426.0000dp</dimen> <dimen name="dp_214">428.0000dp</dimen> <dimen name="dp_215">430.0000dp</dimen> <dimen name="dp_216">432.0000dp</dimen> <dimen name="dp_217">434.0000dp</dimen> <dimen name="dp_218">436.0000dp</dimen> <dimen name="dp_219">438.0000dp</dimen> <dimen name="dp_220">440.0000dp</dimen> <dimen name="dp_221">442.0000dp</dimen> <dimen name="dp_222">444.0000dp</dimen> <dimen name="dp_223">446.0000dp</dimen> <dimen name="dp_224">448.0000dp</dimen> <dimen name="dp_225">450.0000dp</dimen> <dimen name="dp_226">452.0000dp</dimen> <dimen name="dp_227">454.0000dp</dimen> <dimen name="dp_228">456.0000dp</dimen> <dimen name="dp_229">458.0000dp</dimen> <dimen name="dp_230">460.0000dp</dimen> <dimen name="dp_231">462.0000dp</dimen> <dimen name="dp_232">464.0000dp</dimen> <dimen name="dp_233">466.0000dp</dimen> <dimen name="dp_234">468.0000dp</dimen> <dimen name="dp_235">470.0000dp</dimen> <dimen name="dp_236">472.0000dp</dimen> <dimen name="dp_237">474.0000dp</dimen> <dimen name="dp_238">476.0000dp</dimen> <dimen name="dp_239">478.0000dp</dimen> <dimen name="dp_240">480.0000dp</dimen> <dimen name="dp_241">482.0000dp</dimen> <dimen name="dp_242">484.0000dp</dimen> <dimen name="dp_243">486.0000dp</dimen> <dimen name="dp_244">488.0000dp</dimen> <dimen name="dp_245">490.0000dp</dimen> <dimen name="dp_246">492.0000dp</dimen> <dimen name="dp_247">494.0000dp</dimen> <dimen name="dp_248">496.0000dp</dimen> <dimen name="dp_249">498.0000dp</dimen> <dimen name="dp_250">500.0000dp</dimen> <dimen name="dp_251">502.0000dp</dimen> <dimen name="dp_252">504.0000dp</dimen> <dimen name="dp_253">506.0000dp</dimen> <dimen name="dp_254">508.0000dp</dimen> <dimen name="dp_255">510.0000dp</dimen> <dimen name="dp_256">512.0000dp</dimen> <dimen name="dp_257">514.0000dp</dimen> <dimen name="dp_258">516.0000dp</dimen> <dimen name="dp_259">518.0000dp</dimen> <dimen name="dp_260">520.0000dp</dimen> <dimen name="dp_261">522.0000dp</dimen> <dimen name="dp_262">524.0000dp</dimen> <dimen name="dp_263">526.0000dp</dimen> <dimen name="dp_264">528.0000dp</dimen> <dimen name="dp_265">530.0000dp</dimen> <dimen name="dp_266">532.0000dp</dimen> <dimen name="dp_267">534.0000dp</dimen> <dimen name="dp_268">536.0000dp</dimen> <dimen name="dp_269">538.0000dp</dimen> <dimen name="dp_270">540.0000dp</dimen> <dimen name="dp_271">542.0000dp</dimen> <dimen name="dp_272">544.0000dp</dimen> <dimen name="dp_273">546.0000dp</dimen> <dimen name="dp_274">548.0000dp</dimen> <dimen name="dp_275">550.0000dp</dimen> <dimen name="dp_276">552.0000dp</dimen> <dimen name="dp_277">554.0000dp</dimen> <dimen name="dp_278">556.0000dp</dimen> <dimen name="dp_279">558.0000dp</dimen> <dimen name="dp_280">560.0000dp</dimen> <dimen name="dp_281">562.0000dp</dimen> <dimen name="dp_282">564.0000dp</dimen> <dimen name="dp_283">566.0000dp</dimen> <dimen name="dp_284">576.0000dp</dimen> <dimen name="dp_285">570.0000dp</dimen> <dimen name="dp_286">572.0000dp</dimen> <dimen name="dp_287">574.0000dp</dimen> <dimen name="dp_288">576.0000dp</dimen> <dimen name="dp_289">578.0000dp</dimen> <dimen name="dp_290">580.0000dp</dimen> <dimen name="dp_291">582.0000dp</dimen> <dimen name="dp_292">584.0000dp</dimen> <dimen name="dp_293">586.0000dp</dimen> <dimen name="dp_294">588.0000dp</dimen> <dimen name="dp_295">590.0000dp</dimen> <dimen name="dp_296">592.0000dp</dimen> <dimen name="dp_297">594.0000dp</dimen> <dimen name="dp_298">596.0000dp</dimen> <dimen name="dp_299">598.0000dp</dimen> <dimen name="dp_300">600.0000dp</dimen> <dimen name="dp_301">602.0000dp</dimen> <dimen name="dp_302">604.0000dp</dimen> <dimen name="dp_303">606.0000dp</dimen> <dimen name="dp_304">608.0000dp</dimen> <dimen name="dp_305">610.0000dp</dimen> <dimen name="dp_306">612.0000dp</dimen> <dimen name="dp_307">614.0000dp</dimen> <dimen name="dp_308">616.0000dp</dimen> <dimen name="dp_309">618.0000dp</dimen> <dimen name="dp_310">620.0000dp</dimen> <dimen name="dp_311">622.0000dp</dimen> <dimen name="dp_312">624.0000dp</dimen> <dimen name="dp_313">626.0000dp</dimen> <dimen name="dp_314">628.0000dp</dimen> <dimen name="dp_315">630.0000dp</dimen> <dimen name="dp_316">632.0000dp</dimen> <dimen name="dp_317">634.0000dp</dimen> <dimen name="dp_318">636.0000dp</dimen> <dimen name="dp_319">638.0000dp</dimen> <dimen name="dp_320">640.0000dp</dimen> <dimen name="dp_321">642.0000dp</dimen> <dimen name="dp_322">644.0000dp</dimen> <dimen name="dp_323">646.0000dp</dimen> <dimen name="dp_324">648.0000dp</dimen> <dimen name="dp_325">650.0000dp</dimen> <dimen name="dp_326">652.0000dp</dimen> <dimen name="dp_327">654.0000dp</dimen> <dimen name="dp_328">656.0000dp</dimen> <dimen name="dp_329">658.0000dp</dimen> <dimen name="dp_330">660.0000dp</dimen> <dimen name="dp_331">662.0000dp</dimen> <dimen name="dp_332">664.0000dp</dimen> <dimen name="dp_333">666.0000dp</dimen> <dimen name="dp_334">668.0000dp</dimen> <dimen name="dp_335">670.0000dp</dimen> <dimen name="dp_336">672.0000dp</dimen> <dimen name="dp_337">674.0000dp</dimen> <dimen name="dp_338">676.0000dp</dimen> <dimen name="dp_339">678.0000dp</dimen> <dimen name="dp_340">680.0000dp</dimen> <dimen name="dp_341">682.0000dp</dimen> <dimen name="dp_342">684.0000dp</dimen> <dimen name="dp_343">686.0000dp</dimen> <dimen name="dp_344">688.0000dp</dimen> <dimen name="dp_345">690.0000dp</dimen> <dimen name="dp_346">692.0000dp</dimen> <dimen name="dp_347">694.0000dp</dimen> <dimen name="dp_348">696.0000dp</dimen> <dimen name="dp_349">698.0000dp</dimen> <dimen name="dp_350">700.0000dp</dimen> <dimen name="dp_351">702.0000dp</dimen> <dimen name="dp_352">704.0000dp</dimen> <dimen name="dp_353">706.0000dp</dimen> <dimen name="dp_354">708.0000dp</dimen> <dimen name="dp_355">710.0000dp</dimen> <dimen name="dp_356">712.0000dp</dimen> <dimen name="dp_357">714.0000dp</dimen> <dimen name="dp_358">716.0000dp</dimen> <dimen name="dp_359">718.0000dp</dimen> <dimen name="dp_360">720.0000dp</dimen> <dimen name="dp_361">722.0000dp</dimen> <dimen name="dp_362">724.0000dp</dimen> <dimen name="dp_363">726.0000dp</dimen> <dimen name="dp_364">728.0000dp</dimen> <dimen name="dp_365">730.0000dp</dimen> <dimen name="dp_366">732.0000dp</dimen> <dimen name="dp_367">734.0000dp</dimen> <dimen name="dp_368">736.0000dp</dimen> <dimen name="dp_369">738.0000dp</dimen> <dimen name="dp_370">740.0000dp</dimen> <dimen name="dp_371">742.0000dp</dimen> <dimen name="dp_372">744.0000dp</dimen> <dimen name="dp_373">746.0000dp</dimen> <dimen name="dp_374">748.0000dp</dimen> <dimen name="dp_375">750.0000dp</dimen> <dimen name="dp_376">752.0000dp</dimen> <dimen name="dp_377">754.0000dp</dimen> <dimen name="dp_378">756.0000dp</dimen> <dimen name="dp_379">758.0000dp</dimen> <dimen name="dp_380">760.0000dp</dimen> <dimen name="dp_381">762.0000dp</dimen> <dimen name="dp_382">764.0000dp</dimen> <dimen name="dp_383">766.0000dp</dimen> <dimen name="dp_384">776.0000dp</dimen> <dimen name="dp_385">770.0000dp</dimen> <dimen name="dp_386">772.0000dp</dimen> <dimen name="dp_387">774.0000dp</dimen> <dimen name="dp_388">776.0000dp</dimen> <dimen name="dp_389">778.0000dp</dimen> <dimen name="dp_390">780.0000dp</dimen> <dimen name="dp_391">782.0000dp</dimen> <dimen name="dp_392">784.0000dp</dimen> <dimen name="dp_393">786.0000dp</dimen> <dimen name="dp_394">788.0000dp</dimen> <dimen name="dp_395">790.0000dp</dimen> <dimen name="dp_396">792.0000dp</dimen> <dimen name="dp_397">794.0000dp</dimen> <dimen name="dp_398">796.0000dp</dimen> <dimen name="dp_399">798.0000dp</dimen> <dimen name="dp_400">800.0000dp</dimen> <dimen name="dp_401">802.0000dp</dimen> <dimen name="dp_402">804.0000dp</dimen> <dimen name="dp_403">806.0000dp</dimen> <dimen name="dp_404">808.0000dp</dimen> <dimen name="dp_405">810.0000dp</dimen> <dimen name="dp_406">812.0000dp</dimen> <dimen name="dp_407">814.0000dp</dimen> <dimen name="dp_408">816.0000dp</dimen> <dimen name="dp_409">818.0000dp</dimen> <dimen name="dp_410">820.0000dp</dimen> <dimen name="dp_411">822.0000dp</dimen> <dimen name="dp_412">824.0000dp</dimen> <dimen name="dp_413">826.0000dp</dimen> <dimen name="dp_414">828.0000dp</dimen> <dimen name="dp_415">830.0000dp</dimen> <dimen name="dp_416">832.0000dp</dimen> <dimen name="dp_417">834.0000dp</dimen> <dimen name="dp_418">836.0000dp</dimen> <dimen name="dp_419">838.0000dp</dimen> <dimen name="dp_420">840.0000dp</dimen> <dimen name="dp_421">842.0000dp</dimen> <dimen name="dp_422">844.0000dp</dimen> <dimen name="dp_423">846.0000dp</dimen> <dimen name="dp_424">848.0000dp</dimen> <dimen name="dp_425">850.0000dp</dimen> <dimen name="dp_426">852.0000dp</dimen> <dimen name="dp_427">854.0000dp</dimen> <dimen name="dp_428">856.0000dp</dimen> <dimen name="dp_429">858.0000dp</dimen> <dimen name="dp_430">860.0000dp</dimen> <dimen name="dp_431">862.0000dp</dimen> <dimen name="dp_432">864.0000dp</dimen> <dimen name="dp_433">866.0000dp</dimen> <dimen name="dp_434">868.0000dp</dimen> <dimen name="dp_435">870.0000dp</dimen> <dimen name="dp_436">872.0000dp</dimen> <dimen name="dp_437">874.0000dp</dimen> <dimen name="dp_438">876.0000dp</dimen> <dimen name="dp_439">878.0000dp</dimen> <dimen name="dp_440">880.0000dp</dimen> <dimen name="dp_441">882.0000dp</dimen> <dimen name="dp_442">884.0000dp</dimen> <dimen name="dp_443">886.0000dp</dimen> <dimen name="dp_444">888.0000dp</dimen> <dimen name="dp_445">890.0000dp</dimen> <dimen name="dp_446">892.0000dp</dimen> <dimen name="dp_447">894.0000dp</dimen> <dimen name="dp_448">896.0000dp</dimen> <dimen name="dp_449">898.0000dp</dimen> <dimen name="dp_450">900.0000dp</dimen> <dimen name="dp_451">902.0000dp</dimen> <dimen name="dp_452">904.0000dp</dimen> <dimen name="dp_453">906.0000dp</dimen> <dimen name="dp_454">908.0000dp</dimen> <dimen name="dp_455">910.0000dp</dimen> <dimen name="dp_456">912.0000dp</dimen> <dimen name="dp_457">914.0000dp</dimen> <dimen name="dp_458">916.0000dp</dimen> <dimen name="dp_459">918.0000dp</dimen> <dimen name="dp_460">920.0000dp</dimen> <dimen name="dp_461">922.0000dp</dimen> <dimen name="dp_462">924.0000dp</dimen> <dimen name="dp_463">926.0000dp</dimen> <dimen name="dp_464">928.0000dp</dimen> <dimen name="dp_465">930.0000dp</dimen> <dimen name="dp_466">932.0000dp</dimen> <dimen name="dp_467">934.0000dp</dimen> <dimen name="dp_468">936.0000dp</dimen> <dimen name="dp_469">938.0000dp</dimen> <dimen name="dp_470">940.0000dp</dimen> <dimen name="dp_471">942.0000dp</dimen> <dimen name="dp_472">944.0000dp</dimen> <dimen name="dp_473">946.0000dp</dimen> <dimen name="dp_474">948.0000dp</dimen> <dimen name="dp_475">950.0000dp</dimen> <dimen name="dp_476">952.0000dp</dimen> <dimen name="dp_477">954.0000dp</dimen> <dimen name="dp_478">956.0000dp</dimen> <dimen name="dp_479">958.0000dp</dimen> <dimen name="dp_480">960.0000dp</dimen> <dimen name="dp_481">962.0000dp</dimen> <dimen name="dp_482">964.0000dp</dimen> <dimen name="dp_483">966.0000dp</dimen> <dimen name="dp_484">976.0000dp</dimen> <dimen name="dp_485">970.0000dp</dimen> <dimen name="dp_486">972.0000dp</dimen> <dimen name="dp_487">974.0000dp</dimen> <dimen name="dp_488">976.0000dp</dimen> <dimen name="dp_489">978.0000dp</dimen> <dimen name="dp_490">980.0000dp</dimen> <dimen name="dp_491">982.0000dp</dimen> <dimen name="dp_492">984.0000dp</dimen> <dimen name="dp_493">986.0000dp</dimen> <dimen name="dp_494">988.0000dp</dimen> <dimen name="dp_495">990.0000dp</dimen> <dimen name="dp_496">992.0000dp</dimen> <dimen name="dp_497">994.0000dp</dimen> <dimen name="dp_498">996.0000dp</dimen> <dimen name="dp_499">998.0000dp</dimen> <dimen name="dp_500">1000.0000dp</dimen> <dimen name="dp_501">1002.0000dp</dimen> <dimen name="dp_502">1004.0000dp</dimen> <dimen name="dp_503">1006.0000dp</dimen> <dimen name="dp_504">1008.0000dp</dimen> <dimen name="dp_505">1010.0000dp</dimen> <dimen name="dp_506">1012.0000dp</dimen> <dimen name="dp_507">1014.0000dp</dimen> <dimen name="dp_508">1016.0000dp</dimen> <dimen name="dp_509">1018.0000dp</dimen> <dimen name="dp_510">1020.0000dp</dimen> <dimen name="dp_511">1022.0000dp</dimen> <dimen name="dp_512">1024.0000dp</dimen> <dimen name="dp_513">1026.0000dp</dimen> <dimen name="dp_514">1028.0000dp</dimen> <dimen name="dp_515">1030.0000dp</dimen> <dimen name="dp_516">1032.0000dp</dimen> <dimen name="dp_517">1034.0000dp</dimen> <dimen name="dp_518">1036.0000dp</dimen> <dimen name="dp_519">1038.0000dp</dimen> <dimen name="dp_520">1040.0000dp</dimen> <dimen name="dp_521">1042.0000dp</dimen> <dimen name="dp_522">1044.0000dp</dimen> <dimen name="dp_523">1046.0000dp</dimen> <dimen name="dp_524">1048.0000dp</dimen> <dimen name="dp_525">1050.0000dp</dimen> <dimen name="dp_526">1052.0000dp</dimen> <dimen name="dp_527">1054.0000dp</dimen> <dimen name="dp_528">1056.0000dp</dimen> <dimen name="dp_529">1058.0000dp</dimen> <dimen name="dp_530">1060.0000dp</dimen> <dimen name="dp_531">1062.0000dp</dimen> <dimen name="dp_532">1064.0000dp</dimen> <dimen name="dp_533">1066.0000dp</dimen> <dimen name="dp_534">1068.0000dp</dimen> <dimen name="dp_535">1070.0000dp</dimen> <dimen name="dp_536">1072.0000dp</dimen> <dimen name="dp_537">1074.0000dp</dimen> <dimen name="dp_538">1076.0000dp</dimen> <dimen name="dp_539">1078.0000dp</dimen> <dimen name="dp_540">1080.0000dp</dimen> <dimen name="dp_541">1082.0000dp</dimen> <dimen name="dp_542">1084.0000dp</dimen> <dimen name="dp_543">1086.0000dp</dimen> <dimen name="dp_544">1088.0000dp</dimen> <dimen name="dp_545">1090.0000dp</dimen> <dimen name="dp_546">1092.0000dp</dimen> <dimen name="dp_547">1094.0000dp</dimen> <dimen name="dp_548">1096.0000dp</dimen> <dimen name="dp_549">1098.0000dp</dimen> <dimen name="dp_550">1100.0000dp</dimen> <dimen name="dp_551">1102.0000dp</dimen> <dimen name="dp_552">1104.0000dp</dimen> <dimen name="dp_553">1106.0000dp</dimen> <dimen name="dp_554">1108.0000dp</dimen> <dimen name="dp_555">1110.0000dp</dimen> <dimen name="dp_556">1112.0000dp</dimen> <dimen name="dp_557">1114.0000dp</dimen> <dimen name="dp_558">1116.0000dp</dimen> <dimen name="dp_559">1118.0000dp</dimen> <dimen name="dp_560">1120.0000dp</dimen> <dimen name="dp_561">1122.0000dp</dimen> <dimen name="dp_562">1124.0000dp</dimen> <dimen name="dp_563">1126.0000dp</dimen> <dimen name="dp_564">1128.0000dp</dimen> <dimen name="dp_565">1130.0000dp</dimen> <dimen name="dp_566">1132.0000dp</dimen> <dimen name="dp_567">1134.0000dp</dimen> <dimen name="dp_568">1136.0000dp</dimen> <dimen name="dp_569">1138.0000dp</dimen> <dimen name="dp_570">1140.0000dp</dimen> <dimen name="dp_571">1142.0000dp</dimen> <dimen name="dp_572">1144.0000dp</dimen> <dimen name="dp_573">1146.0000dp</dimen> <dimen name="dp_574">1148.0000dp</dimen> <dimen name="dp_575">1150.0000dp</dimen> <dimen name="dp_576">1152.0000dp</dimen> <dimen name="dp_577">1154.0000dp</dimen> <dimen name="dp_578">1156.0000dp</dimen> <dimen name="dp_579">1158.0000dp</dimen> <dimen name="dp_580">1160.0000dp</dimen> <dimen name="dp_581">1162.0000dp</dimen> <dimen name="dp_582">1164.0000dp</dimen> <dimen name="dp_583">1166.0000dp</dimen> <dimen name="dp_584">1176.0000dp</dimen> <dimen name="dp_585">1170.0000dp</dimen> <dimen name="dp_586">1172.0000dp</dimen> <dimen name="dp_587">1174.0000dp</dimen> <dimen name="dp_588">1176.0000dp</dimen> <dimen name="dp_589">1178.0000dp</dimen> <dimen name="dp_590">1180.0000dp</dimen> <dimen name="dp_591">1182.0000dp</dimen> <dimen name="dp_592">1184.0000dp</dimen> <dimen name="dp_593">1186.0000dp</dimen> <dimen name="dp_594">1188.0000dp</dimen> <dimen name="dp_595">1190.0000dp</dimen> <dimen name="dp_596">1192.0000dp</dimen> <dimen name="dp_597">1194.0000dp</dimen> <dimen name="dp_598">1196.0000dp</dimen> <dimen name="dp_599">1198.0000dp</dimen> <dimen name="dp_600">1200.0000dp</dimen> <dimen name="dp_601">1202.0000dp</dimen> <dimen name="dp_602">1204.0000dp</dimen> <dimen name="dp_603">1206.0000dp</dimen> <dimen name="dp_604">1208.0000dp</dimen> <dimen name="dp_605">1210.0000dp</dimen> <dimen name="dp_606">1212.0000dp</dimen> <dimen name="dp_607">1214.0000dp</dimen> <dimen name="dp_608">1216.0000dp</dimen> <dimen name="dp_609">1218.0000dp</dimen> <dimen name="dp_610">1220.0000dp</dimen> <dimen name="dp_611">1222.0000dp</dimen> <dimen name="dp_612">1224.0000dp</dimen> <dimen name="dp_613">1226.0000dp</dimen> <dimen name="dp_614">1228.0000dp</dimen> <dimen name="dp_615">1230.0000dp</dimen> <dimen name="dp_616">1232.0000dp</dimen> <dimen name="dp_617">1234.0000dp</dimen> <dimen name="dp_618">1236.0000dp</dimen> <dimen name="dp_619">1238.0000dp</dimen> <dimen name="dp_620">1240.0000dp</dimen> <dimen name="dp_621">1242.0000dp</dimen> <dimen name="dp_622">1244.0000dp</dimen> <dimen name="dp_623">1246.0000dp</dimen> <dimen name="dp_624">1248.0000dp</dimen> <dimen name="dp_625">1250.0000dp</dimen> <dimen name="dp_626">1252.0000dp</dimen> <dimen name="dp_627">1254.0000dp</dimen> <dimen name="dp_628">1256.0000dp</dimen> <dimen name="dp_629">1258.0000dp</dimen> <dimen name="dp_630">1260.0000dp</dimen> <dimen name="dp_631">1262.0000dp</dimen> <dimen name="dp_632">1264.0000dp</dimen> <dimen name="dp_633">1266.0000dp</dimen> <dimen name="dp_634">1268.0000dp</dimen> <dimen name="dp_635">1270.0000dp</dimen> <dimen name="dp_636">1272.0000dp</dimen> <dimen name="dp_637">1274.0000dp</dimen> <dimen name="dp_638">1276.0000dp</dimen> <dimen name="dp_639">1278.0000dp</dimen> <dimen name="dp_640">1280.0000dp</dimen> <dimen name="dp_641">1282.0000dp</dimen> <dimen name="dp_642">1284.0000dp</dimen> <dimen name="dp_643">1286.0000dp</dimen> <dimen name="dp_644">1288.0000dp</dimen> <dimen name="dp_645">1290.0000dp</dimen> <dimen name="dp_646">1292.0000dp</dimen> <dimen name="dp_647">1294.0000dp</dimen> <dimen name="dp_648">1296.0000dp</dimen> <dimen name="dp_649">1298.0000dp</dimen> <dimen name="dp_650">1300.0000dp</dimen> <dimen name="dp_651">1302.0000dp</dimen> <dimen name="dp_652">1304.0000dp</dimen> <dimen name="dp_653">1306.0000dp</dimen> <dimen name="dp_654">1308.0000dp</dimen> <dimen name="dp_655">1310.0000dp</dimen> <dimen name="dp_656">1312.0000dp</dimen> <dimen name="dp_657">1314.0000dp</dimen> <dimen name="dp_658">1316.0000dp</dimen> <dimen name="dp_659">1318.0000dp</dimen> <dimen name="dp_660">1320.0000dp</dimen> <dimen name="dp_661">1322.0000dp</dimen> <dimen name="dp_662">1324.0000dp</dimen> <dimen name="dp_663">1326.0000dp</dimen> <dimen name="dp_664">1328.0000dp</dimen> <dimen name="dp_665">1330.0000dp</dimen> <dimen name="dp_666">1332.0000dp</dimen> <dimen name="dp_667">1334.0000dp</dimen> <dimen name="dp_668">1336.0000dp</dimen> <dimen name="dp_669">1338.0000dp</dimen> <dimen name="dp_670">1340.0000dp</dimen> <dimen name="dp_671">1342.0000dp</dimen> <dimen name="dp_672">1344.0000dp</dimen> <dimen name="dp_673">1346.0000dp</dimen> <dimen name="dp_674">1348.0000dp</dimen> <dimen name="dp_675">1350.0000dp</dimen> <dimen name="dp_676">1352.0000dp</dimen> <dimen name="dp_677">1354.0000dp</dimen> <dimen name="dp_678">1356.0000dp</dimen> <dimen name="dp_679">1358.0000dp</dimen> <dimen name="dp_680">1360.0000dp</dimen> <dimen name="dp_681">1362.0000dp</dimen> <dimen name="dp_682">1364.0000dp</dimen> <dimen name="dp_683">1366.0000dp</dimen> <dimen name="dp_684">1376.0000dp</dimen> <dimen name="dp_685">1370.0000dp</dimen> <dimen name="dp_686">1372.0000dp</dimen> <dimen name="dp_687">1374.0000dp</dimen> <dimen name="dp_688">1376.0000dp</dimen> <dimen name="dp_689">1378.0000dp</dimen> <dimen name="dp_690">1380.0000dp</dimen> <dimen name="dp_691">1382.0000dp</dimen> <dimen name="dp_692">1384.0000dp</dimen> <dimen name="dp_693">1386.0000dp</dimen> <dimen name="dp_694">1388.0000dp</dimen> <dimen name="dp_695">1390.0000dp</dimen> <dimen name="dp_696">1392.0000dp</dimen> <dimen name="dp_697">1394.0000dp</dimen> <dimen name="dp_698">1396.0000dp</dimen> <dimen name="dp_699">1398.0000dp</dimen> <dimen name="dp_700">1400.0000dp</dimen> <dimen name="dp_701">1402.0000dp</dimen> <dimen name="dp_702">1404.0000dp</dimen> <dimen name="dp_703">1406.0000dp</dimen> <dimen name="dp_704">1408.0000dp</dimen> <dimen name="dp_705">1410.0000dp</dimen> <dimen name="dp_706">1412.0000dp</dimen> <dimen name="dp_707">1414.0000dp</dimen> <dimen name="dp_708">1416.0000dp</dimen> <dimen name="dp_709">1418.0000dp</dimen> <dimen name="dp_710">1420.0000dp</dimen> <dimen name="dp_711">1422.0000dp</dimen> <dimen name="dp_712">1424.0000dp</dimen> <dimen name="dp_713">1426.0000dp</dimen> <dimen name="dp_714">1428.0000dp</dimen> <dimen name="dp_715">1430.0000dp</dimen> <dimen name="dp_716">1432.0000dp</dimen> <dimen name="dp_717">1434.0000dp</dimen> <dimen name="dp_718">1436.0000dp</dimen> <dimen name="dp_719">1438.0000dp</dimen> <dimen name="dp_720">1440.0000dp</dimen> <dimen name="dp_721">1442.0000dp</dimen> <dimen name="dp_722">1444.0000dp</dimen> <dimen name="dp_723">1446.0000dp</dimen> <dimen name="dp_724">1448.0000dp</dimen> <dimen name="dp_725">1450.0000dp</dimen> <dimen name="dp_726">1452.0000dp</dimen> <dimen name="dp_727">1454.0000dp</dimen> <dimen name="dp_728">1456.0000dp</dimen> <dimen name="dp_729">1458.0000dp</dimen> <dimen name="dp_730">1460.0000dp</dimen> <dimen name="dp_731">1462.0000dp</dimen> <dimen name="dp_732">1464.0000dp</dimen> <dimen name="dp_733">1466.0000dp</dimen> <dimen name="dp_734">1468.0000dp</dimen> <dimen name="dp_735">1470.0000dp</dimen> <dimen name="dp_736">1472.0000dp</dimen> <dimen name="dp_737">1474.0000dp</dimen> <dimen name="dp_738">1476.0000dp</dimen> <dimen name="dp_739">1478.0000dp</dimen> <dimen name="dp_740">1480.0000dp</dimen> <dimen name="dp_741">1482.0000dp</dimen> <dimen name="dp_742">1484.0000dp</dimen> <dimen name="dp_743">1486.0000dp</dimen> <dimen name="dp_744">1488.0000dp</dimen> <dimen name="dp_745">1490.0000dp</dimen> <dimen name="dp_746">1492.0000dp</dimen> <dimen name="dp_747">1494.0000dp</dimen> <dimen name="dp_748">1496.0000dp</dimen> <dimen name="dp_749">1498.0000dp</dimen> <dimen name="dp_750">1500.0000dp</dimen> <dimen name="dp_751">1502.0000dp</dimen> <dimen name="dp_752">1504.0000dp</dimen> <dimen name="dp_753">1506.0000dp</dimen> <dimen name="dp_754">1508.0000dp</dimen> <dimen name="dp_755">1510.0000dp</dimen> <dimen name="dp_756">1512.0000dp</dimen> <dimen name="dp_757">1514.0000dp</dimen> <dimen name="dp_758">1516.0000dp</dimen> <dimen name="dp_759">1518.0000dp</dimen> <dimen name="dp_760">1520.0000dp</dimen> <dimen name="dp_761">1522.0000dp</dimen> <dimen name="dp_762">1524.0000dp</dimen> <dimen name="dp_763">1526.0000dp</dimen> <dimen name="dp_764">1528.0000dp</dimen> <dimen name="dp_765">1530.0000dp</dimen> <dimen name="dp_766">1532.0000dp</dimen> <dimen name="dp_767">1534.0000dp</dimen> <dimen name="dp_768">1536.0000dp</dimen> <dimen name="dp_769">1538.0000dp</dimen> <dimen name="dp_770">1540.0000dp</dimen> <dimen name="dp_771">1542.0000dp</dimen> <dimen name="dp_772">1544.0000dp</dimen> <dimen name="dp_773">1546.0000dp</dimen> <dimen name="dp_774">1548.0000dp</dimen> <dimen name="dp_775">1550.0000dp</dimen> <dimen name="dp_776">1552.0000dp</dimen> <dimen name="dp_777">1554.0000dp</dimen> <dimen name="dp_778">1556.0000dp</dimen> <dimen name="dp_779">1558.0000dp</dimen> <dimen name="dp_780">1560.0000dp</dimen> <dimen name="dp_781">1562.0000dp</dimen> <dimen name="dp_782">1564.0000dp</dimen> <dimen name="dp_783">1566.0000dp</dimen> <dimen name="dp_784">1576.0000dp</dimen> <dimen name="dp_785">1570.0000dp</dimen> <dimen name="dp_786">1572.0000dp</dimen> <dimen name="dp_787">1574.0000dp</dimen> <dimen name="dp_788">1576.0000dp</dimen> <dimen name="dp_789">1578.0000dp</dimen> <dimen name="dp_790">1580.0000dp</dimen> <dimen name="dp_791">1582.0000dp</dimen> <dimen name="dp_792">1584.0000dp</dimen> <dimen name="dp_793">1586.0000dp</dimen> <dimen name="dp_794">1588.0000dp</dimen> <dimen name="dp_795">1590.0000dp</dimen> <dimen name="dp_796">1592.0000dp</dimen> <dimen name="dp_797">1594.0000dp</dimen> <dimen name="dp_798">1596.0000dp</dimen> <dimen name="dp_799">1598.0000dp</dimen> <dimen name="dp_800">1600.0000dp</dimen> <dimen name="dp_801">1602.0000dp</dimen> <dimen name="dp_802">1604.0000dp</dimen> <dimen name="dp_803">1606.0000dp</dimen> <dimen name="dp_804">1608.0000dp</dimen> <dimen name="dp_805">1610.0000dp</dimen> <dimen name="dp_806">1612.0000dp</dimen> <dimen name="dp_807">1614.0000dp</dimen> <dimen name="dp_808">1616.0000dp</dimen> <dimen name="dp_809">1618.0000dp</dimen> <dimen name="dp_810">1620.0000dp</dimen> <dimen name="dp_811">1622.0000dp</dimen> <dimen name="dp_812">1624.0000dp</dimen> <dimen name="dp_813">1626.0000dp</dimen> <dimen name="dp_814">1628.0000dp</dimen> <dimen name="dp_815">1630.0000dp</dimen> <dimen name="dp_816">1632.0000dp</dimen> <dimen name="dp_817">1634.0000dp</dimen> <dimen name="dp_818">1636.0000dp</dimen> <dimen name="dp_819">1638.0000dp</dimen> <dimen name="dp_820">1640.0000dp</dimen> <dimen name="dp_821">1642.0000dp</dimen> <dimen name="dp_822">1644.0000dp</dimen> <dimen name="dp_823">1646.0000dp</dimen> <dimen name="dp_824">1648.0000dp</dimen> <dimen name="dp_825">1650.0000dp</dimen> <dimen name="dp_826">1652.0000dp</dimen> <dimen name="dp_827">1654.0000dp</dimen> <dimen name="dp_828">1656.0000dp</dimen> <dimen name="dp_829">1658.0000dp</dimen> <dimen name="dp_830">1660.0000dp</dimen> <dimen name="dp_831">1662.0000dp</dimen> <dimen name="dp_832">1664.0000dp</dimen> <dimen name="dp_833">1666.0000dp</dimen> <dimen name="dp_834">1668.0000dp</dimen> <dimen name="dp_835">1670.0000dp</dimen> <dimen name="dp_836">1672.0000dp</dimen> <dimen name="dp_837">1674.0000dp</dimen> <dimen name="dp_838">1676.0000dp</dimen> <dimen name="dp_839">1678.0000dp</dimen> <dimen name="dp_840">1680.0000dp</dimen> <dimen name="dp_841">1682.0000dp</dimen> <dimen name="dp_842">1684.0000dp</dimen> <dimen name="dp_843">1686.0000dp</dimen> <dimen name="dp_844">1688.0000dp</dimen> <dimen name="dp_845">1690.0000dp</dimen> <dimen name="dp_846">1692.0000dp</dimen> <dimen name="dp_847">1694.0000dp</dimen> <dimen name="dp_848">1696.0000dp</dimen> <dimen name="dp_849">1698.0000dp</dimen> <dimen name="dp_850">1700.0000dp</dimen> <dimen name="dp_851">1702.0000dp</dimen> <dimen name="dp_852">1704.0000dp</dimen> <dimen name="dp_853">1706.0000dp</dimen> <dimen name="dp_854">1708.0000dp</dimen> <dimen name="dp_855">1710.0000dp</dimen> <dimen name="dp_856">1712.0000dp</dimen> <dimen name="dp_857">1714.0000dp</dimen> <dimen name="dp_858">1716.0000dp</dimen> <dimen name="dp_859">1718.0000dp</dimen> <dimen name="dp_860">1720.0000dp</dimen> <dimen name="dp_861">1722.0000dp</dimen> <dimen name="dp_862">1724.0000dp</dimen> <dimen name="dp_863">1726.0000dp</dimen> <dimen name="dp_864">1728.0000dp</dimen> <dimen name="dp_865">1730.0000dp</dimen> <dimen name="dp_866">1732.0000dp</dimen> <dimen name="dp_867">1734.0000dp</dimen> <dimen name="dp_868">1736.0000dp</dimen> <dimen name="dp_869">1738.0000dp</dimen> <dimen name="dp_870">1740.0000dp</dimen> <dimen name="dp_871">1742.0000dp</dimen> <dimen name="dp_872">1744.0000dp</dimen> <dimen name="dp_873">1746.0000dp</dimen> <dimen name="dp_874">1748.0000dp</dimen> <dimen name="dp_875">1750.0000dp</dimen> <dimen name="dp_876">1752.0000dp</dimen> <dimen name="dp_877">1754.0000dp</dimen> <dimen name="dp_878">1756.0000dp</dimen> <dimen name="dp_879">1758.0000dp</dimen> <dimen name="dp_880">1760.0000dp</dimen> <dimen name="dp_881">1762.0000dp</dimen> <dimen name="dp_882">1764.0000dp</dimen> <dimen name="dp_883">1766.0000dp</dimen> <dimen name="dp_884">1776.0000dp</dimen> <dimen name="dp_885">1770.0000dp</dimen> <dimen name="dp_886">1772.0000dp</dimen> <dimen name="dp_887">1774.0000dp</dimen> <dimen name="dp_888">1776.0000dp</dimen> <dimen name="dp_889">1778.0000dp</dimen> <dimen name="dp_890">1780.0000dp</dimen> <dimen name="dp_891">1782.0000dp</dimen> <dimen name="dp_892">1784.0000dp</dimen> <dimen name="dp_893">1786.0000dp</dimen> <dimen name="dp_894">1788.0000dp</dimen> <dimen name="dp_895">1790.0000dp</dimen> <dimen name="dp_896">1792.0000dp</dimen> <dimen name="dp_897">1794.0000dp</dimen> <dimen name="dp_898">1796.0000dp</dimen> <dimen name="dp_899">1798.0000dp</dimen> <dimen name="dp_900">1800.0000dp</dimen> <dimen name="dp_901">1802.0000dp</dimen> <dimen name="dp_902">1804.0000dp</dimen> <dimen name="dp_903">1806.0000dp</dimen> <dimen name="dp_904">1808.0000dp</dimen> <dimen name="dp_905">1810.0000dp</dimen> <dimen name="dp_906">1812.0000dp</dimen> <dimen name="dp_907">1814.0000dp</dimen> <dimen name="dp_908">1816.0000dp</dimen> <dimen name="dp_909">1818.0000dp</dimen> <dimen name="dp_910">1820.0000dp</dimen> <dimen name="dp_911">1822.0000dp</dimen> <dimen name="dp_912">1824.0000dp</dimen> <dimen name="dp_913">1826.0000dp</dimen> <dimen name="dp_914">1828.0000dp</dimen> <dimen name="dp_915">1830.0000dp</dimen> <dimen name="dp_916">1832.0000dp</dimen> <dimen name="dp_917">1834.0000dp</dimen> <dimen name="dp_918">1836.0000dp</dimen> <dimen name="dp_919">1838.0000dp</dimen> <dimen name="dp_920">1840.0000dp</dimen> <dimen name="dp_921">1842.0000dp</dimen> <dimen name="dp_922">1844.0000dp</dimen> <dimen name="dp_923">1846.0000dp</dimen> <dimen name="dp_924">1848.0000dp</dimen> <dimen name="dp_925">1850.0000dp</dimen> <dimen name="dp_926">1852.0000dp</dimen> <dimen name="dp_927">1854.0000dp</dimen> <dimen name="dp_928">1856.0000dp</dimen> <dimen name="dp_929">1858.0000dp</dimen> <dimen name="dp_930">1860.0000dp</dimen> <dimen name="dp_931">1862.0000dp</dimen> <dimen name="dp_932">1864.0000dp</dimen> <dimen name="dp_933">1866.0000dp</dimen> <dimen name="dp_934">1868.0000dp</dimen> <dimen name="dp_935">1870.0000dp</dimen> <dimen name="dp_936">1872.0000dp</dimen> <dimen name="dp_937">1874.0000dp</dimen> <dimen name="dp_938">1876.0000dp</dimen> <dimen name="dp_939">1878.0000dp</dimen> <dimen name="dp_940">1880.0000dp</dimen> <dimen name="dp_941">1882.0000dp</dimen> <dimen name="dp_942">1884.0000dp</dimen> <dimen name="dp_943">1886.0000dp</dimen> <dimen name="dp_944">1888.0000dp</dimen> <dimen name="dp_945">1890.0000dp</dimen> <dimen name="dp_946">1892.0000dp</dimen> <dimen name="dp_947">1894.0000dp</dimen> <dimen name="dp_948">1896.0000dp</dimen> <dimen name="dp_949">1898.0000dp</dimen> <dimen name="dp_950">1900.0000dp</dimen> <dimen name="dp_951">1902.0000dp</dimen> <dimen name="dp_952">1904.0000dp</dimen> <dimen name="dp_953">1906.0000dp</dimen> <dimen name="dp_954">1908.0000dp</dimen> <dimen name="dp_955">1910.0000dp</dimen> <dimen name="dp_956">1912.0000dp</dimen> <dimen name="dp_957">1914.0000dp</dimen> <dimen name="dp_958">1916.0000dp</dimen> <dimen name="dp_959">1918.0000dp</dimen> <dimen name="dp_960">1920.0000dp</dimen> <dimen name="dp_961">1922.0000dp</dimen> <dimen name="dp_962">1924.0000dp</dimen> <dimen name="dp_963">1926.0000dp</dimen> <dimen name="dp_964">1928.0000dp</dimen> <dimen name="dp_965">1930.0000dp</dimen> <dimen name="dp_966">1932.0000dp</dimen> <dimen name="dp_967">1934.0000dp</dimen> <dimen name="dp_968">1936.0000dp</dimen> <dimen name="dp_969">1938.0000dp</dimen> <dimen name="dp_970">1940.0000dp</dimen> <dimen name="dp_971">1942.0000dp</dimen> <dimen name="dp_972">1944.0000dp</dimen> <dimen name="dp_973">1946.0000dp</dimen> <dimen name="dp_974">1948.0000dp</dimen> <dimen name="dp_975">1950.0000dp</dimen> <dimen name="dp_976">1952.0000dp</dimen> <dimen name="dp_977">1954.0000dp</dimen> <dimen name="dp_978">1956.0000dp</dimen> <dimen name="dp_979">1958.0000dp</dimen> <dimen name="dp_980">1960.0000dp</dimen> <dimen name="dp_981">1962.0000dp</dimen> <dimen name="dp_982">1964.0000dp</dimen> <dimen name="dp_983">1966.0000dp</dimen> <dimen name="dp_984">1976.0000dp</dimen> <dimen name="dp_985">1970.0000dp</dimen> <dimen name="dp_986">1972.0000dp</dimen> <dimen name="dp_987">1974.0000dp</dimen> <dimen name="dp_988">1976.0000dp</dimen> <dimen name="dp_989">1978.0000dp</dimen> <dimen name="dp_990">1980.0000dp</dimen> <dimen name="dp_991">1982.0000dp</dimen> <dimen name="dp_992">1984.0000dp</dimen> <dimen name="dp_993">1986.0000dp</dimen> <dimen name="dp_994">1988.0000dp</dimen> <dimen name="dp_995">1990.0000dp</dimen> <dimen name="dp_996">1992.0000dp</dimen> <dimen name="dp_997">1994.0000dp</dimen> <dimen name="dp_998">1996.0000dp</dimen> <dimen name="dp_999">1998.0000dp</dimen> <dimen name="dp_1000">2000.0000dp</dimen> </resources> ```
/content/code_sandbox/RxUI/src/main/res/values-sw720dp/dimens.xml
xml
2016-09-24T09:30:45
2024-08-16T09:54:41
RxTool
Tamsiree/RxTool
12,242
20,813
```xml import fluxString from 'src/flux/helpers/fluxString' describe('Flux.helpers.fluxString', () => { ;[ { js: ``, flux: `""`, }, { js: `ab_cd`, flux: `"ab_cd"`, }, { js: '\r\n\t"\\', flux: `"\\r\\n\\t\\"\\\\"`, name: '\\r\\n\\t"\\', }, { js: '${\u03A9$', flux: '"\\${\u03A9$"', }, ].forEach(({js, flux, name}) => it(`creates flux sring from "${name ? name : JSON.stringify(js)}"`, () => { expect(fluxString(js)).toEqual(flux) }) ) }) ```
/content/code_sandbox/ui/test/flux/helpers/fluxString.test.ts
xml
2016-08-24T23:28:56
2024-08-13T19:50:03
chronograf
influxdata/chronograf
1,494
180
```xml <?xml version="1.0" encoding="utf-8"?><!-- ~ ~ ~ Permission is hereby granted, free of charge, to any person obtaining a copy ~ of this software and associated documentation files (the "Software"), to deal ~ in the Software without restriction, including without limitation the rights ~ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell ~ copies of the Software, and to permit persons to whom the Software is ~ furnished to do so, subject to the following conditions: ~ ~ The above copyright notice and this permission notice shall be included in all ~ copies or substantial portions of the Software. ~ ~ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR ~ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, ~ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE ~ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER ~ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, ~ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE ~ SOFTWARE. --> <layer-list xmlns:android="path_to_url"> <item android:drawable="@drawable/mi_ic_next" /> <item android:drawable="@drawable/mi_ic_finish" /> </layer-list> ```
/content/code_sandbox/library/src/main/res/drawable/mi_ic_next_finish.xml
xml
2016-02-18T21:20:47
2024-07-30T10:09:54
material-intro
janheinrichmerker/material-intro
1,737
306
```xml import Link from "next/link"; export default function Home() { return ( <ul> <li> <Link href="/a">/a (Pages Router)</Link> </li> <li> <Link href="/b">b (App Router)</Link> </li> </ul> ); } ```
/content/code_sandbox/examples/custom-server/pages/index.tsx
xml
2016-10-05T23:32:51
2024-08-16T19:44:30
next.js
vercel/next.js
124,056
73
```xml import { isProtonDocument } from '@proton/shared/lib/helpers/mimetype'; import type { Api } from '@proton/shared/lib/interfaces'; import { ExperimentGroup, Features, measureFeaturePerformance } from '../../../utils/telemetry'; import type { DownloadCallbacks, DownloadStreamControls, GetChildrenCallback, LinkDownload, LogCallback, OnContainsDocumentCallback, OnInitCallback, OnProgressCallback, OnSignatureIssueCallback, } from '../interface'; import ArchiveGenerator from './archiveGenerator'; import ConcurrentIterator from './concurrentIterator'; import { FolderTreeLoader } from './downloadLinkFolder'; import type { NestedLinkDownload } from './interface'; /** * initDownloadLinks prepares controls to download archive of passed `links`. * All links are in the root of the generated archive. */ export default function initDownloadLinks( links: LinkDownload[], callbacks: DownloadCallbacks, log: LogCallback, isNewFolderTreeAlgorithmEnabled: boolean, api: Api, options?: { virusScan?: boolean } ): DownloadStreamControls { const folderLoaders: Map<String, FolderTreeLoader> = new Map(); const concurrentIterator = new ConcurrentIterator(); const archiveGenerator = new ArchiveGenerator(); const measureTotalSizeComputation = measureFeaturePerformance( api, Features.totalSizeComputation, isNewFolderTreeAlgorithmEnabled ? ExperimentGroup.treatment : ExperimentGroup.control ); const cancel = () => { Array.from(folderLoaders.values()).forEach((folderLoader) => folderLoader.cancel()); archiveGenerator.cancel(); concurrentIterator.cancel(); measureTotalSizeComputation.clear(); }; const start = () => { measureTotalSizeComputation.start(); // To get link into progresses right away so potentially loader can be displayed. callbacks.onProgress?.( links.map(({ linkId }) => linkId), 0 ); loadTotalSize( links, folderLoaders, log, callbacks.getChildren, isNewFolderTreeAlgorithmEnabled, callbacks.onInit, callbacks.onSignatureIssue, callbacks.onProgress, callbacks.onContainsDocument ) .then(({ linkSizes }) => { measureTotalSizeComputation.end({ quantity: Object.keys(linkSizes).length }); }) .catch((err: Error) => { log(`initDownloadLinks => loadTotalSize failed: ${err}`); callbacks.onError?.(err); cancel(); }); const linksIterator = iterateAllLinks(links, folderLoaders, callbacks.onContainsDocument); const linksWithStreamsIterator = concurrentIterator.iterate(linksIterator, callbacks, log, options); archiveGenerator .writeLinks(linksWithStreamsIterator) .then(() => { callbacks.onFinish?.(); }) .catch((err: Error) => { log(`initDownloadLinks => archiveGenerator failed: ${err}`); callbacks.onError?.(err); cancel(); }); return archiveGenerator.stream; }; return { start, pause: () => concurrentIterator.pause(), resume: () => concurrentIterator.resume(), cancel, }; } function loadTotalSize( links: LinkDownload[], folderLoaders: Map<String, FolderTreeLoader>, log: LogCallback, getChildren: GetChildrenCallback, isNewFolderTreeAlgorithmEnabled: boolean, onInit?: OnInitCallback, onSignatureIssue?: OnSignatureIssueCallback, onProgress?: OnProgressCallback, onContainsDocument?: OnContainsDocumentCallback ) { const sizePromises = links.map(async (link) => { // Proton Documents are skipped, so let's set them as 0 size if (isProtonDocument(link.mimeType)) { return { size: 0, linkSizes: { [link.linkId]: 0 } }; } if (link.isFile) { return { size: link.size, linkSizes: Object.fromEntries([[link.linkId, link.size]]) }; } const folderLoader = new FolderTreeLoader(link, log, isNewFolderTreeAlgorithmEnabled); folderLoaders.set(link.shareId + link.linkId, folderLoader); const result = await folderLoader.load(getChildren, onSignatureIssue, onProgress, onContainsDocument); result.linkSizes[link.linkId] = result.size; return result; }); return Promise.all(sizePromises).then((results) => { const size = results.reduce((total, { size }) => total + size, 0); const linkSizes = results.reduce((sum, { linkSizes }) => ({ ...sum, ...linkSizes }), {}); onInit?.(size, linkSizes); return { size, linkSizes }; }); } async function* iterateAllLinks( links: LinkDownload[], folderLoaders: Map<String, FolderTreeLoader>, onContainsDocument?: OnContainsDocumentCallback ): AsyncGenerator<NestedLinkDownload> { for (const link of links) { // If this is removed, remove it in `loadTotalSize` as well. if (isProtonDocument(link.mimeType)) { await onContainsDocument?.(new AbortController().signal); continue; } yield { parentLinkIds: [], parentPath: [], ...link, }; if (!link.isFile) { const f = folderLoaders.get(link.shareId + link.linkId) as FolderTreeLoader; for await (const childLink of f.iterateAllChildren()) { yield { ...childLink, parentPath: [link.name, ...childLink.parentPath], }; } } } } ```
/content/code_sandbox/applications/drive/src/app/store/_downloads/download/downloadLinks.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
1,183
```xml import * as React from 'react' import * as Path from 'path' import { Dispatcher } from '../dispatcher' import { initGitRepository, createCommit, getStatus, getAuthorIdentity, getRepositoryType, RepositoryType, } from '../../lib/git' import { sanitizedRepositoryName } from './sanitized-repository-name' import { TextBox } from '../lib/text-box' import { Button } from '../lib/button' import { Row } from '../lib/row' import { Checkbox, CheckboxValue } from '../lib/checkbox' import { writeDefaultReadme } from './write-default-readme' import { Select } from '../lib/select' import { writeGitDescription } from '../../lib/git/description' import { getGitIgnoreNames, writeGitIgnore } from './gitignores' import { writeGitAttributes } from './git-attributes' import { getDefaultDir, setDefaultDir } from '../lib/default-dir' import { Dialog, DialogContent, DialogFooter, DialogError } from '../dialog' import { LinkButton } from '../lib/link-button' import { PopupType } from '../../models/popup' import { Ref } from '../lib/ref' import { enableReadmeOverwriteWarning } from '../../lib/feature-flag' import { OkCancelButtonGroup } from '../dialog/ok-cancel-button-group' import { showOpenDialog } from '../main-process-proxy' import { pathExists } from '../lib/path-exists' import { mkdir } from 'fs/promises' import { directoryExists } from '../../lib/directory-exists' import { FoldoutType } from '../../lib/app-state' import { join } from 'path' import { isTopMostDialog } from '../dialog/is-top-most' import { InputError } from '../lib/input-description/input-error' import { InputWarning } from '../lib/input-description/input-warning' /** The sentinel value used to indicate no gitignore should be used. */ const NoGitIgnoreValue = 'None' /** The sentinel value used to indicate no license should be used. */ name: 'None', featured: false, body: '', hidden: false, } /** Is the path a git repository? */ export const isGitRepository = async (path: string) => { const type = await getRepositoryType(path).catch(e => { log.error(`Unable to determine repository type`, e) return { kind: 'missing' } as RepositoryType }) if (type.kind === 'unsafe') { // If the path is considered unsafe by Git we won't be able to // verify that it's a repository (or worktree). So we'll fall back to this // naive approximation. return directoryExists(join(path, '.git')) } return type.kind !== 'missing' } interface ICreateRepositoryProps { readonly dispatcher: Dispatcher readonly onDismissed: () => void /** Prefills path input so user doesn't have to. */ readonly initialPath?: string /** Whether the dialog is the top most in the dialog stack */ readonly isTopMost: boolean } interface ICreateRepositoryState { readonly path: string | null readonly name: string readonly description: string /** Is the given path able to be written to? */ readonly isValidPath: boolean | null /** Is the given path already a repository? */ readonly isRepository: boolean /** Should the repository be created with a default README? */ readonly createWithReadme: boolean /** Is the repository currently in the process of being created? */ readonly creating: boolean /** The names for the available gitignores. */ readonly gitIgnoreNames: ReadonlyArray<string> | null /** The gitignore to include in the repository. */ readonly gitIgnore: string /** The available licenses. */ /** The license to include in the repository. */ readonly license: string /** * Whether or not a README.md file already exists in the * directory that may be overwritten by initializing with * a new README.md. */ readonly readMeExists: boolean } /** The Create New Repository component. */ export class CreateRepository extends React.Component< ICreateRepositoryProps, ICreateRepositoryState > { private checkIsTopMostDialog = isTopMostDialog( () => { this.updateReadMeExists(this.state.path, this.state.name) window.addEventListener('focus', this.onWindowFocus) }, () => { window.removeEventListener('focus', this.onWindowFocus) } ) public constructor(props: ICreateRepositoryProps) { super(props) const path = this.props.initialPath ? this.props.initialPath : null const name = this.props.initialPath ? sanitizedRepositoryName(Path.basename(this.props.initialPath)) : '' this.state = { path, name, description: '', createWithReadme: false, creating: false, gitIgnoreNames: null, gitIgnore: NoGitIgnoreValue, licenses: null, isValidPath: null, isRepository: false, readMeExists: false, } if (path === null) { this.initializePath() } } public async componentDidMount() { this.checkIsTopMostDialog(this.props.isTopMost) const gitIgnoreNames = await getGitIgnoreNames() this.setState({ gitIgnoreNames, licenses }) const path = this.state.path ?? (await getDefaultDir()) this.updateIsRepository(path, this.state.name) this.updateReadMeExists(path, this.state.name) } public componentDidUpdate(): void { this.checkIsTopMostDialog(this.props.isTopMost) } public componentWillUnmount(): void { this.checkIsTopMostDialog(false) } private initializePath = async () => { const path = await getDefaultDir() this.setState(s => (s.path === null ? { path } : null)) } private onPathChanged = async (path: string) => { this.setState({ path, isValidPath: null, isRepository: false }) this.updateIsRepository(path, this.state.name) this.updateReadMeExists(path, this.state.name) } private onNameChanged = (name: string) => { const { path } = this.state this.setState({ name }) if (path === null) { return } this.updateIsRepository(path, name) this.updateReadMeExists(this.state.path, name) } private async updateIsRepository(path: string, name: string) { const fullPath = Path.join(path, sanitizedRepositoryName(name)) const isRepository = await isGitRepository(fullPath) // Only update isRepository if the path is still the same one we were using // to check whether it looked like a repository. this.setState(state => state.path === path && state.name === name ? { isRepository } : null ) } private onDescriptionChanged = (description: string) => { this.setState({ description }) } private showFilePicker = async () => { const path = await showOpenDialog({ properties: ['createDirectory', 'openDirectory'], }) if (path === null) { return } this.setState({ path, isRepository: false }) this.updateIsRepository(path, this.state.name) } private async updateReadMeExists(path: string | null, name: string) { if (!enableReadmeOverwriteWarning() || path === null) { return } const fullPath = Path.join(path, sanitizedRepositoryName(name), 'README.md') const readMeExists = await pathExists(fullPath) // Only update readMeExists if the path is still the same this.setState(state => (state.path === path ? { readMeExists } : null)) } private resolveRepositoryRoot = async (): Promise<string | null> => { const currentPath = this.state.path if (currentPath === null) { return null } if (this.props.initialPath && this.props.initialPath === currentPath) { // if the user provided an initial path and didn't change it, we should // validate it is an existing path and use that for the repository try { await mkdir(currentPath, { recursive: true }) return currentPath } catch {} } return Path.join(currentPath, sanitizedRepositoryName(this.state.name)) } private createRepository = async () => { const fullPath = await this.resolveRepositoryRoot() if (fullPath === null) { // Shouldn't be able to get here with a null full path, but if you did, // display error. this.setState({ isValidPath: true }) return } try { await mkdir(fullPath, { recursive: true }) this.setState({ isValidPath: true }) } catch (e) { if (e.code === 'EACCES' && e.errno === -13) { return this.setState({ isValidPath: false }) } log.error( `createRepository: the directory at ${fullPath} is not valid`, e ) return this.props.dispatcher.postError(e) } this.setState({ creating: true }) try { await initGitRepository(fullPath) } catch (e) { this.setState({ creating: false }) log.error( `createRepository: unable to initialize a Git repository at ${fullPath}`, e ) return this.props.dispatcher.postError(e) } const repositories = await this.props.dispatcher.addRepositories([fullPath]) if (repositories.length < 1) { return } const repository = repositories[0] if (this.state.createWithReadme) { try { await writeDefaultReadme( fullPath, this.state.name, this.state.description ) } catch (e) { log.error(`createRepository: unable to write README at ${fullPath}`, e) this.props.dispatcher.postError(e) } } const gitIgnore = this.state.gitIgnore if (gitIgnore !== NoGitIgnoreValue) { try { await writeGitIgnore(fullPath, gitIgnore) } catch (e) { log.error( `createRepository: unable to write .gitignore file at ${fullPath}`, e ) this.props.dispatcher.postError(e) } } const description = this.state.description if (description) { try { await writeGitDescription(fullPath, description) } catch (e) { log.error( `createRepository: unable to write .git/description file at ${fullPath}`, e ) this.props.dispatcher.postError(e) } } const licenseName = const license = (this.state.licenses || []).find( l => l.name === licenseName ) if (license) { try { const author = await getAuthorIdentity(repository) fullname: author ? author.name : '', email: author ? author.email : '', year: new Date().getFullYear().toString(), description: '', project: this.state.name, }) } catch (e) { log.error(`createRepository: unable to write LICENSE at ${fullPath}`, e) this.props.dispatcher.postError(e) } } try { const gitAttributes = Path.join(fullPath, '.gitattributes') const gitAttributesExists = await pathExists(gitAttributes) if (!gitAttributesExists) { await writeGitAttributes(fullPath) } } catch (e) { log.error( `createRepository: unable to write .gitattributes at ${fullPath}`, e ) this.props.dispatcher.postError(e) } const status = await getStatus(repository) if (status === null) { this.props.dispatcher.postError( new Error( `Unable to create the new repository because there are too many new files in this directory` ) ) return } try { const wd = status.workingDirectory const files = wd.files if (files.length > 0) { await createCommit(repository, 'Initial commit', files) } } catch (e) { log.error(`createRepository: initial commit failed at ${fullPath}`, e) this.props.dispatcher.postError(e) } this.setState({ creating: false }) this.updateDefaultDirectory() this.props.dispatcher.closeFoldout(FoldoutType.Repository) this.props.dispatcher.selectRepository(repository) this.props.dispatcher.recordCreateRepository() this.props.onDismissed() } private updateDefaultDirectory = () => { // don't update the default directory as a result of creating the // repository from an empty folder, because this value will be the // repository path itself if (!this.props.initialPath && this.state.path !== null) { setDefaultDir(this.state.path) } } private onCreateWithReadmeChange = ( event: React.FormEvent<HTMLInputElement> ) => { this.setState({ createWithReadme: event.currentTarget.checked, }) } private renderSanitizedName() { const sanitizedName = sanitizedRepositoryName(this.state.name) if (this.state.name === sanitizedName) { return null } return ( <InputWarning id="repo-sanitized-name-warning" trackedUserInput={this.state.name} ariaLiveMessage={`Will be created as ${sanitizedName}. Spaces and invalid characters have been replaced by hyphens.`} > <p>Will be created as {sanitizedName}</p> <span className="sr-only"> Spaces and invalid characters have been replaced by hyphens. </span> </InputWarning> ) } private onGitIgnoreChange = (event: React.FormEvent<HTMLSelectElement>) => { const gitIgnore = event.currentTarget.value this.setState({ gitIgnore }) } const license = event.currentTarget.value this.setState({ license }) } private renderGitIgnores() { const gitIgnores = this.state.gitIgnoreNames || [] const options = [NoGitIgnoreValue, ...gitIgnores] return ( <Row> <Select label={__DARWIN__ ? 'Git Ignore' : 'Git ignore'} value={this.state.gitIgnore} onChange={this.onGitIgnoreChange} > {options.map(n => ( <option key={n} value={n}> {n} </option> ))} </Select> </Row> ) } const licenses = this.state.licenses || [] ...licenses.filter(l => l.featured), ] return ( <Row> <Select value={this.state.license} > <option key={l.name} value={l.name}> {l.name} </option> ))} <option disabled={true}></option> <option key={l.name} value={l.name}> {l.name} </option> ))} </Select> </Row> ) } private renderInvalidPathError() { const isValidPath = this.state.isValidPath const pathSet = isValidPath !== null if (!pathSet || isValidPath) { return null } return ( <DialogError> Directory could not be created at this path. You may not have permissions to create a directory here. </DialogError> ) } private renderGitRepositoryError() { const isRepo = this.state.isRepository if (!this.state.path || this.state.path.length === 0 || !isRepo) { return null } return ( <Row> <InputError id="existing-repository-path-error" trackedUserInput={this.state.path + this.state.name} ariaLiveMessage={ 'This directory appears to be a Git repository. Would you like to add this repository instead?' } > This directory appears to be a Git repository. Would you like to{' '} <LinkButton onClick={this.onAddRepositoryClicked}> add this repository </LinkButton>{' '} instead? </InputError> </Row> ) } private renderReadmeOverwriteWarning() { if (!enableReadmeOverwriteWarning()) { return null } if ( this.state.createWithReadme === false || this.state.readMeExists === false ) { return null } return ( <Row> <InputWarning id="readme-overwrite-warning" trackedUserInput={this.state.createWithReadme} ariaLiveMessage="This directory contains a README.md file already. Checking this box will result in the existing file being overwritten." > This directory contains a <Ref>README.md</Ref> file already. Checking this box will result in the existing file being overwritten. </InputWarning> </Row> ) } private onAddRepositoryClicked = () => { this.props.onDismissed() const { path, name } = this.state // Shouldn't be able to even get here if path is null. if (path !== null) { this.props.dispatcher.showPopup({ type: PopupType.AddRepository, path: Path.join(path, sanitizedRepositoryName(name)), }) } } public render() { const disabled = this.state.path === null || this.state.path.length === 0 || this.state.name.length === 0 || this.state.creating || this.state.isRepository const readOnlyPath = !!this.props.initialPath const loadingDefaultDir = this.state.path === null return ( <Dialog id="create-repository" title={ __DARWIN__ ? 'Create a New Repository' : 'Create a new repository' } loading={this.state.creating} onSubmit={this.createRepository} onDismissed={this.props.onDismissed} > {this.renderInvalidPathError()} <DialogContent> <Row> <TextBox value={this.state.name} label="Name" placeholder="repository name" onValueChanged={this.onNameChanged} ariaDescribedBy="existing-repository-path-error repo-sanitized-name-warning" /> </Row> {this.renderSanitizedName()} <Row> <TextBox value={this.state.description} label="Description" onValueChanged={this.onDescriptionChanged} /> </Row> <Row> <TextBox value={this.state.path ?? ''} label={__DARWIN__ ? 'Local Path' : 'Local path'} placeholder="repository path" onValueChanged={this.onPathChanged} disabled={readOnlyPath || loadingDefaultDir} ariaDescribedBy="existing-repository-path-error" /> <Button onClick={this.showFilePicker} disabled={readOnlyPath || loadingDefaultDir} > Choose </Button> </Row> {this.renderGitRepositoryError()} <Row> <Checkbox label="Initialize this repository with a README" value={ this.state.createWithReadme ? CheckboxValue.On : CheckboxValue.Off } onChange={this.onCreateWithReadmeChange} ariaDescribedBy="readme-overwrite-warning" /> </Row> {this.renderReadmeOverwriteWarning()} {this.renderGitIgnores()} </DialogContent> <DialogFooter> <OkCancelButtonGroup okButtonText={ __DARWIN__ ? 'Create Repository' : 'Create repository' } okButtonDisabled={disabled || loadingDefaultDir} /> </DialogFooter> </Dialog> ) } private onWindowFocus = () => { // Verify whether or not a README.md file exists at the chosen directory // in case one has been added or removed and the warning can be displayed. this.updateReadMeExists(this.state.path, this.state.name) } } ```
/content/code_sandbox/app/src/ui/add-repository/create-repository.tsx
xml
2016-05-11T15:59:00
2024-08-16T17:00:41
desktop
desktop/desktop
19,544
4,319
```xml <?xml version="1.0" encoding="UTF-8" ?> <definitions id="definitions" targetNamespace="path_to_url" xmlns="path_to_url" xmlns:activiti="path_to_url"> <process id="FormPropertyDetails"> <startEvent id="start"> <extensionElements> <activiti:formProperty id="speaker" name="Speaker" variable="SpeakerName" type="string" /> <activiti:formProperty id="start" type="date" datePattern="dd-MMM-yyyy" /> <activiti:formProperty id="direction" type="enum"> <activiti:value id="left" name="Go Left" /> <activiti:value id="right" name="Go Right" /> <activiti:value id="up" name="Go Up" /> <activiti:value id="down" name="Go Down" /> </activiti:formProperty> </extensionElements> </startEvent> </process> </definitions> ```
/content/code_sandbox/modules/flowable5-test/src/test/resources/org/activiti/engine/test/api/form/FormServiceTest.testFormPropertyDetails.bpmn20.xml
xml
2016-10-13T07:21:43
2024-08-16T15:23:14
flowable-engine
flowable/flowable-engine
7,715
232
```xml import type { GraphQLSchema, GraphQLType } from 'graphql'; import React, { Fragment, PureComponent } from 'react'; import { GraphQLExplorerTypeLink } from './graph-ql-explorer-type-link'; interface Props { onNavigateType: (type: GraphQLType) => void; schema: GraphQLSchema; } export class GraphQLExplorerSchema extends PureComponent<Props> { renderQueryType() { const { schema, onNavigateType } = this.props; const type = schema.getQueryType(); if (!type) { return null; } return ( <Fragment> <span className="success">query</span>:{' '} <GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} /> </Fragment> ); } renderMutationType() { const { schema, onNavigateType } = this.props; const type = schema.getMutationType(); if (!type) { return null; } return ( <Fragment> <span className="success">mutation</span>:{' '} <GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} /> </Fragment> ); } renderSubscriptionType() { const { schema, onNavigateType } = this.props; const type = schema.getSubscriptionType(); if (!type) { return null; } return ( <Fragment> <span className="success">subscription</span>:{' '} <GraphQLExplorerTypeLink onNavigate={onNavigateType} type={type} /> </Fragment> ); } render() { return ( <div className="graphql-explorer__schema"> <p>A GraphQL schema provides a root type for each kind of operation.</p> <h2 className="graphql-explorer__subheading">Root Types</h2> <ul className="graphql-explorer__defs"> <li>{this.renderQueryType()}</li> <li>{this.renderMutationType()}</li> <li>{this.renderSubscriptionType()}</li> </ul> </div> ); } } ```
/content/code_sandbox/packages/insomnia/src/ui/components/graph-ql-explorer/graph-ql-explorer-schema.tsx
xml
2016-04-23T03:54:26
2024-08-16T16:50:44
insomnia
Kong/insomnia
34,054
450
```xml function mergeRects(rects: DOMRect[]): DOMRect { const left = Math.min(...rects.map((rect) => rect.left)) const top = Math.min(...rects.map((rect) => rect.top)) const right = Math.max(...rects.map((rect) => rect.right)) const bottom = Math.max(...rects.map((rect) => rect.bottom)) return new DOMRect(left, top, right - left, bottom - top) } export function getDOMRangeRect(nativeSelection: Selection, rootElement: HTMLElement): DOMRect { const domRange = nativeSelection.getRangeAt(0) const startContainer = domRange.startContainer let rect if (nativeSelection.anchorNode === rootElement) { let inner = rootElement while (inner.firstElementChild != null) { inner = inner.firstElementChild as HTMLElement } if (inner !== rootElement) { rect = inner.getBoundingClientRect() } else { // If there are no children in the root element, we calculate // the rect based on the root's padding and line height const rootRect = rootElement.getBoundingClientRect() const rootElementStyles = getComputedStyle(rootElement) const topPadding = parseFloat(rootElementStyles.paddingTop) const lineHeight = parseFloat(rootElementStyles.lineHeight) const top = rootRect.top + topPadding + lineHeight const leftPadding = parseFloat(rootElementStyles.paddingLeft) const left = rootRect.left + leftPadding rect = new DOMRect(left, top, 0, 0) } } else { const clientRects = domRange.getClientRects() if (clientRects.length > 0) { // Merge all client rects into one if there are multiple rect = mergeRects(Array.from(clientRects)) } else { rect = domRange.getBoundingClientRect() // If the range is collapsed, use the start container's rect if (rect.width === 0 && rect.height === 0 && startContainer instanceof Element) { rect = startContainer.getBoundingClientRect() } } } return rect } ```
/content/code_sandbox/applications/docs-editor/src/app/Utils/getDOMRangeRect.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
452
```xml <?xml version="1.0" encoding="UTF-8"?> <web-app version="3.0" xmlns="path_to_url" xmlns:xsi="path_to_url" xsi:schemaLocation="path_to_url path_to_url"> <display-name></display-name> <filter> <filter-name>gzip</filter-name> <filter-class>cn.hncu.filter.GzipFilter</filter-class> </filter> <filter-mapping> <filter-name>gzip</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> <servlet> <servlet-name>FirstGzipServlet</servlet-name> <servlet-class>cn.hncu.servlets.FirstGzipServlet</servlet-class> </servlet> <servlet> <servlet-name>SecondServlet</servlet-name> <servlet-class>cn.hncu.servlets.SecondServlet</servlet-class> </servlet> <servlet> <servlet-name>ThirdServlet</servlet-name> <servlet-class>cn.hncu.servlets.ThirdServlet</servlet-class> </servlet> <servlet-mapping> <servlet-name>FirstGzipServlet</servlet-name> <url-pattern>/FirstGzipServlet</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>SecondServlet</servlet-name> <url-pattern>/servlet/SecondServlet</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>ThirdServlet</servlet-name> <url-pattern>/servlet/ThirdServlet</url-pattern> </servlet-mapping> <welcome-file-list> <welcome-file>index.jsp</welcome-file> </welcome-file-list> </web-app> ```
/content/code_sandbox/myGzipWeb/WebRoot/WEB-INF/web.xml
xml
2016-04-25T16:39:57
2024-08-16T08:33:16
Java
chenhaoxiang/Java
1,250
421
```xml import { getCommitsBetweenCommits } from '../../lib/git' import { promiseWithMinimumTimeout } from '../../lib/promise' import { Branch } from '../../models/branch' import { ComputedAction } from '../../models/computed-action' import { MultiCommitOperationKind } from '../../models/multi-commit-operation' import { RebasePreview } from '../../models/rebase' import { Repository } from '../../models/repository' import { IDropdownSelectButtonOption } from '../dropdown-select-button' export function getMergeOptions(): ReadonlyArray<IDropdownSelectButtonOption> { return [ { label: 'Create a merge commit', description: 'The commits from the selected branch will be added to the current branch via a merge commit.', id: MultiCommitOperationKind.Merge, }, { label: 'Squash and merge', description: 'The commits in the selected branch will be combined into one commit in the current branch.', id: MultiCommitOperationKind.Squash, }, { label: 'Rebase', description: 'The commits from the selected branch will be rebased and added to the current branch.', id: MultiCommitOperationKind.Rebase, }, ] } export async function updateRebasePreview( baseBranch: Branch, targetBranch: Branch, repository: Repository, onUpdate: (rebasePreview: RebasePreview | null) => void ) { const computingRebaseForBranch = baseBranch.name onUpdate({ kind: ComputedAction.Loading, }) const commits = await promiseWithMinimumTimeout( () => getCommitsBetweenCommits( repository, baseBranch.tip.sha, targetBranch.tip.sha ), 500 ) // if the branch being track has changed since we started this work, abandon // any further state updates (this function is re-entrant if the user is // using the keyboard to quickly switch branches) if (computingRebaseForBranch !== baseBranch.name) { onUpdate(null) return } // if we are unable to find any commits to rebase, indicate that we're // unable to proceed with the rebase if (commits === null) { onUpdate({ kind: ComputedAction.Invalid, }) return } onUpdate({ kind: ComputedAction.Clean, commits, }) } ```
/content/code_sandbox/app/src/ui/lib/update-branch.ts
xml
2016-05-11T15:59:00
2024-08-16T17:00:41
desktop
desktop/desktop
19,544
514
```xml <RelativeLayout xmlns:android="path_to_url" xmlns:tools="path_to_url" android:layout_width="match_parent" android:layout_height="match_parent" android:paddingLeft="@dimen/activity_horizontal_margin" android:paddingRight="@dimen/activity_horizontal_margin" android:paddingTop="@dimen/activity_vertical_margin" android:paddingBottom="@dimen/activity_vertical_margin" tools:context=".MainActivity"> <android.support.v7.widget.RecyclerView android:layout_width="match_parent" android:layout_height="match_parent" android:id="@+id/rv" /> </RelativeLayout> ```
/content/code_sandbox/sample/src/main/res/layout/activity_main.xml
xml
2016-08-16T12:50:30
2024-08-13T08:27:46
StateProgressBar
kofigyan/StateProgressBar
1,537
131
```xml import { c } from 'ttag'; import { PassCryptoItemError } from './errors'; /* this is roughly equivalent to a 7kb binary blob */ export const MAX_ITEM_CONTENT_B64_LENGTH = 53248; export const validateItemContentSize = (base64Content: string): string => { if (base64Content.length > MAX_ITEM_CONTENT_B64_LENGTH) { throw new PassCryptoItemError(c('Error').t`Item content cannot exceed 40KB`); } return base64Content; }; ```
/content/code_sandbox/packages/pass/lib/crypto/utils/validators.ts
xml
2016-06-08T11:16:51
2024-08-16T14:14:27
WebClients
ProtonMail/WebClients
4,300
109
```xml import React from 'react'; /** * Create a React ref object that is friendly for snapshots. * It will be represented as `[React.ref]` in snapshots. * @returns a React ref object. */ export declare function createSnapshotFriendlyRef<T>(): React.RefObject<T>; //# sourceMappingURL=Refs.d.ts.map ```
/content/code_sandbox/packages/expo-modules-core/build/Refs.d.ts
xml
2016-08-15T17:14:25
2024-08-16T19:54:44
expo
expo/expo
32,004
65
```xml <?xml version="1.0" encoding="UTF-8"?> <project xmlns="path_to_url"> <type>org.netbeans.modules.java.j2seproject</type> <configuration> <data xmlns="path_to_url"> <name>j2se-simple</name> <minimum-ant-version>1.6</minimum-ant-version> <source-roots> <root id="src.dir"/> </source-roots> <test-roots> <root id="test.src.dir"/> </test-roots> </data> </configuration> </project> ```
/content/code_sandbox/visualvm/libs.profiler/lib.profiler/test/qa-functional/data/projects/j2se-simple/nbproject/project.xml
xml
2016-09-12T14:44:30
2024-08-16T14:41:50
visualvm
oracle/visualvm
2,821
129
```xml <!-- ~ contributor license agreements. See the NOTICE file distributed with ~ this work for additional information regarding copyright ownership. ~ ~ path_to_url ~ ~ Unless required by applicable law or agreed to in writing, software ~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. --> <dataset> <metadata> <column name="constraint_catalog" /> <column name="constraint_schema" /> <column name="constraint_name" /> <column name="unique_constraint_catalog" /> <column name="unique_constraint_schema" /> <column name="unique_constraint_name" /> <column name="match_option" /> <column name="update_rule" /> <column name="delete_rule" /> <column name="table_name" /> <column name="referenced_table_name" /> </metadata> </dataset> ```
/content/code_sandbox/test/e2e/sql/src/test/resources/cases/dql/dataset/empty_storage_units/mysql/select_mysql_information_schema_referential_constraints.xml
xml
2016-01-18T12:49:26
2024-08-16T15:48:11
shardingsphere
apache/shardingsphere
19,707
190
```xml <!-- // THE CODE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, // INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, // DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH // THE CODE OR THE USE OR OTHER DEALINGS IN THE CODE. --> <ResourceDictionary xmlns="path_to_url" xmlns:x="path_to_url"> <ResourceDictionary.MergedDictionaries> <ResourceDictionary Source="ms-appx:///Microsoft.Toolkit.Uwp.UI.Controls.DataGrid/DataGrid/DataGrid.xaml"/> </ResourceDictionary.MergedDictionaries> </ResourceDictionary> ```
/content/code_sandbox/Microsoft.Toolkit.Uwp.UI.Controls.DataGrid/Themes/Generic.xaml
xml
2016-06-17T21:29:46
2024-08-16T09:32:00
WindowsCommunityToolkit
CommunityToolkit/WindowsCommunityToolkit
5,842
160
```xml import { arrayMove } from "@dnd-kit/sortable" import styled from "@emotion/styled" import { range } from "lodash" import ChevronDoubleLeftIcon from "mdi-react/ChevronDoubleLeftIcon" import ChevronDoubleRightIcon from "mdi-react/ChevronDoubleRightIcon" import { observer } from "mobx-react-lite" import { useCallback, useState } from "react" import { useStores } from "../../hooks/useStores" import { Localized } from "../../localize/useLocalization" import { ControlMode, controlModeKey, defaultControlModes, isEqualControlMode, } from "../../stores/ControlStore" import { ControlName } from "../ControlPane/ControlName" import { Dialog, DialogActions, DialogContent, DialogTitle, } from "../Dialog/Dialog" import { Button } from "../ui/Button" import { DraggableList } from "./DraggableList" const nonControllerControlModes: ControlMode[] = [ { type: "velocity", }, { type: "pitchBend", }, ] const getAllControlModes = (): ControlMode[] => nonControllerControlModes.concat( range(0, 128).map((i) => ({ type: "controller", controllerType: i })), ) const Item = styled.div<{ isSelected: boolean }>` padding: 0.5rem 1rem; background: ${({ theme, isSelected }) => isSelected ? theme.themeColor : "transparent"}; white-space: nowrap; ` const Content = styled.div` max-height: 30rem; display: flex; ` const Pane = styled.div` flex-grow: 1; flex-basis: 0; overflow: auto; background: ${({ theme }) => theme.secondaryBackgroundColor}; ` const CenterPane = styled.div` display: flex; flex-direction: column; align-items: center; justify-content: center; padding: 1rem; ` const InsertButton = styled(Button)` background: ${({ theme }) => theme.secondaryBackgroundColor}; display: flex; align-items: center; margin-bottom: 1rem; min-width: 7rem; justify-content: center; ` export const ControlSettingDialog = observer(() => { const rootStore = useStores() const { rootViewStore, controlStore } = rootStore const { openControlSettingDialog: open } = rootViewStore const [selectedLeftMode, setSelectedLeftMode] = useState<ControlMode | null>( null, ) const [selectedRightMode, setSelectedRightMode] = useState<ControlMode | null>(null) const leftModes = controlStore.controlModes const rightModes = getAllControlModes().filter( (mode) => !controlStore.controlModes.some((m) => isEqualControlMode(m, mode)), ) const leftItems = leftModes.map((mode) => ({ mode, isSelected: selectedLeftMode !== null && isEqualControlMode(mode, selectedLeftMode), })) const rightItems = rightModes.map((mode) => ({ mode, isSelected: selectedRightMode !== null && isEqualControlMode(mode, selectedRightMode), })) const onClose = useCallback( () => (rootViewStore.openControlSettingDialog = false), [rootViewStore], ) const onClickAdd = () => { if (selectedRightMode) { controlStore.controlModes.push(selectedRightMode) setSelectedRightMode(null) } } const onClickRemove = () => { if (selectedLeftMode) { controlStore.controlModes = controlStore.controlModes.filter( (mode) => !isEqualControlMode(mode, selectedLeftMode), ) setSelectedLeftMode(null) } } const onLeftItemMoved = (fromId: string, toId: string) => { const fromIndex = leftItems.findIndex( (item) => controlModeKey(item.mode) === fromId, ) const toIndex = leftItems.findIndex( (item) => controlModeKey(item.mode) === toId, ) if (fromIndex === -1 || toIndex === -1) { return } controlStore.controlModes = arrayMove( controlStore.controlModes, fromIndex, toIndex, ) } const onClickRestoreDefaults = () => { controlStore.controlModes = defaultControlModes } return ( <Dialog open={open} onOpenChange={onClose} style={{ maxWidth: "40rem" }}> <DialogTitle> <Localized name="control-settings" /> </DialogTitle> <DialogContent> <Content> <Pane> <DraggableList items={leftItems} getItemId={(item) => controlModeKey(item.mode)} onItemMoved={onLeftItemMoved} render={(item) => ( <Item key={controlModeKey(item.mode)} isSelected={item.isSelected} onClick={() => { setSelectedLeftMode(item.mode) setSelectedRightMode(null) }} > <ControlName mode={item.mode} /> </Item> )} /> </Pane> <CenterPane> <InsertButton onClick={onClickAdd}> <ChevronDoubleLeftIcon style={{ width: "1.25rem" }} /> Add </InsertButton> <InsertButton onClick={onClickRemove}> Remove <ChevronDoubleRightIcon style={{ width: "1.25rem" }} /> </InsertButton> </CenterPane> <Pane> {rightItems.map((item) => ( <Item key={controlModeKey(item.mode)} isSelected={item.isSelected} onClick={() => { setSelectedLeftMode(null) setSelectedRightMode(item.mode) }} > <ControlName mode={item.mode} /> </Item> ))} </Pane> </Content> </DialogContent> <DialogActions> <Button onClick={onClickRestoreDefaults}> <Localized name="restore-defaults" /> </Button> <div style={{ flex: 1 }} /> <Button onClick={onClose}> <Localized name="close" /> </Button> </DialogActions> </Dialog> ) }) ```
/content/code_sandbox/app/src/components/ControlSettingDialog/ControlSettingDialog.tsx
xml
2016-03-06T15:19:53
2024-08-15T14:27:10
signal
ryohey/signal
1,238
1,333
```xml import * as React from 'react'; import { Header } from '@fluentui/react-northstar'; const HeaderExampleRtl = () => ( <Header as="h2" content=" " description=" ." /> ); export default HeaderExampleRtl; ```
/content/code_sandbox/packages/fluentui/docs/src/examples/components/Header/Rtl/HeaderExample.rtl.tsx
xml
2016-06-06T15:03:44
2024-08-16T18:49:29
fluentui
microsoft/fluentui
18,221
56
```xml import { CommonModule } from "@angular/common"; import { ChangeDetectionStrategy, Component } from "@angular/core"; @Component({ selector: "bit-card", standalone: true, imports: [CommonModule], template: `<ng-content></ng-content>`, changeDetection: ChangeDetectionStrategy.OnPush, host: { class: "tw-box-border tw-block tw-bg-background tw-text-main tw-border-solid tw-border-b tw-border-0 tw-border-b-secondary-300 tw-rounded-lg tw-py-4 tw-px-3", }, }) export class CardComponent {} ```
/content/code_sandbox/libs/components/src/card/card.component.ts
xml
2016-03-09T23:14:01
2024-08-16T15:07:51
clients
bitwarden/clients
8,877
123
```xml import React from 'react'; import { fireEvent, render, waitFor, screen } from '@testing-library/react'; import sinon from 'sinon'; import { testStandardProps } from '@test/utils'; import Message from '../Message'; import ToastContext from '../../toaster/ToastContext'; describe('Message', () => { testStandardProps(<Message />); it('Should render a Message', () => { render(<Message />); expect(screen.getByRole('alert')).to.class('rs-message'); }); it('Should render a title', () => { render(<Message header="title" />); expect(screen.getByRole('alert').className).to.include('rs-message-has-title'); expect(screen.getByRole('alert')).to.text('title'); }); it('Should render a description', () => { render(<Message>description</Message>); expect(screen.getByRole('alert')).to.text('description'); }); it('Should be bordered', () => { render(<Message bordered />); expect(screen.getByRole('alert')).to.have.class('rs-message-bordered'); }); it('Should be centered', () => { render(<Message centered />); expect(screen.getByRole('alert')).to.have.class('rs-message-centered'); }); it('Should have a type', () => { render(<Message type="info" />); expect(screen.getByRole('alert').className).to.include('rs-message-info'); }); it('Should display icon', () => { render(<Message showIcon type="info" />); // eslint-disable-next-line testing-library/no-node-access expect(screen.getByRole('alert').querySelector('.rs-icon')).to.exist; expect(screen.getByRole('alert').className).to.include('rs-message-has-icon'); }); it('Should be full', () => { render(<Message full />); expect(screen.getByRole('alert').className).to.include('rs-message-full'); }); it('Should be closable', () => { render(<Message closable />); expect(screen.getByRole('button', { name: /close/i })).to.exist; }); it('Should call onClose callback', () => { const onCloseSpy = sinon.spy(); render(<Message closable onClose={onCloseSpy} />); fireEvent.click(screen.getByRole('button', { name: /close/i })); expect(onCloseSpy).to.have.been.calledOnce; }); it('Should call onClose callback by usedToaster', async () => { const onCloseSpy = sinon.spy(); render( <ToastContext.Provider value={{ usedToaster: true }}> <Message duration={1} onClose={onCloseSpy} /> </ToastContext.Provider> ); await waitFor(() => { expect(onCloseSpy).to.have.been.calledOnce; }); }); }); ```
/content/code_sandbox/src/Message/test/MessageSpec.tsx
xml
2016-06-06T02:27:46
2024-08-16T16:41:54
rsuite
rsuite/rsuite
8,263
600
```xml <?xml version="1.0" encoding="UTF-8"?> <!-- *** GENERATED FROM project.xml - DO NOT EDIT *** *** EDIT ../build.xml INSTEAD *** --> <project name="org.graalvm.visualizer.selectioncoordinator-impl" basedir=".."> <fail message="Please build using Ant 1.7.1 or higher."> <condition> <not> <antversion atleast="1.7.1"/> </not> </condition> </fail> <property file="nbproject/private/suite-private.properties"/> <property file="nbproject/suite.properties"/> <fail unless="suite.dir">You must set 'suite.dir' to point to your containing module suite</fail> <property file="${suite.dir}/nbproject/private/platform-private.properties"/> <property file="${suite.dir}/nbproject/platform.properties"/> <macrodef name="property" uri="path_to_url"> <attribute name="name"/> <attribute name="value"/> <sequential> <property name="@{name}" value="${@{value}}"/> </sequential> </macrodef> <macrodef name="evalprops" uri="path_to_url"> <attribute name="property"/> <attribute name="value"/> <sequential> <property name="@{property}" value="@{value}"/> </sequential> </macrodef> <property file="${user.properties.file}"/> <nbmproject2:property name="harness.dir" value="nbplatform.${nbplatform.active}.harness.dir" xmlns:nbmproject2="path_to_url"/> <nbmproject2:property name="nbplatform.active.dir" value="nbplatform.${nbplatform.active}.netbeans.dest.dir" xmlns:nbmproject2="path_to_url"/> <nbmproject2:evalprops property="cluster.path.evaluated" value="${cluster.path}" xmlns:nbmproject2="path_to_url"/> <fail message="Path to 'platform' cluster missing in $${cluster.path} property or using corrupt Netbeans Platform (missing harness)."> <condition> <not> <contains string="${cluster.path.evaluated}" substring="platform"/> </not> </condition> </fail> <import file="${harness.dir}/build.xml"/> </project> ```
/content/code_sandbox/visualizer/IdealGraphVisualizer/SelectionCoordinator/nbproject/build-impl.xml
xml
2016-01-14T17:11:35
2024-08-16T17:54:25
graal
oracle/graal
20,129
499
```xml /************************************************************* * * * * path_to_url * * Unless required by applicable law or agreed to in writing, software * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. */ import * as Entities from '../Entities.js'; Entities.add({ Barv: '\u2AE7', Barwed: '\u2306', Bcy: '\u0411', Bernoullis: '\u212C', Beta: '\u0392', Bumpeq: '\u224E', bNot: '\u2AED', backcong: '\u224C', backepsilon: '\u03F6', barvee: '\u22BD', barwed: '\u2305', barwedge: '\u2305', bbrk: '\u23B5', bbrktbrk: '\u23B6', bcong: '\u224C', bcy: '\u0431', bdquo: '\u201E', becaus: '\u2235', because: '\u2235', bemptyv: '\u29B0', bepsi: '\u03F6', bernou: '\u212C', bigcap: '\u22C2', bigcup: '\u22C3', bigvee: '\u22C1', bigwedge: '\u22C0', bkarow: '\u290D', blacksquare: '\u25AA', blacktriangleright: '\u25B8', blank: '\u2423', blk12: '\u2592', blk14: '\u2591', blk34: '\u2593', block: '\u2588', bne: '\u003D\u20E5', bnequiv: '\u2261\u20E5', bnot: '\u2310', bot: '\u22A5', bottom: '\u22A5', boxDL: '\u2557', boxDR: '\u2554', boxDl: '\u2556', boxDr: '\u2553', boxH: '\u2550', boxHD: '\u2566', boxHU: '\u2569', boxHd: '\u2564', boxHu: '\u2567', boxUL: '\u255D', boxUR: '\u255A', boxUl: '\u255C', boxUr: '\u2559', boxV: '\u2551', boxVH: '\u256C', boxVL: '\u2563', boxVR: '\u2560', boxVh: '\u256B', boxVl: '\u2562', boxVr: '\u255F', boxbox: '\u29C9', boxdL: '\u2555', boxdR: '\u2552', boxh: '\u2500', boxhD: '\u2565', boxhU: '\u2568', boxhd: '\u252C', boxhu: '\u2534', boxuL: '\u255B', boxuR: '\u2558', boxv: '\u2502', boxvH: '\u256A', boxvL: '\u2561', boxvR: '\u255E', boxvh: '\u253C', boxvl: '\u2524', boxvr: '\u251C', bprime: '\u2035', breve: '\u02D8', brvbar: '\u00A6', bsemi: '\u204F', bsim: '\u223D', bsime: '\u22CD', bsolb: '\u29C5', bsolhsub: '\u27C8', bullet: '\u2022', bump: '\u224E', bumpE: '\u2AAE', bumpe: '\u224F', bumpeq: '\u224F' }, 'b'); ```
/content/code_sandbox/ts/util/entities/b.ts
xml
2016-02-23T09:52:03
2024-08-16T04:46:50
MathJax-src
mathjax/MathJax-src
2,017
919
```xml import { mockStore, screen, simpleRender } from 'test-utils'; import { fAccounts } from '@fixtures'; import { translateRaw } from '@translations'; import { ClaimState, ClaimType, ITxValue } from '@types'; import { ClaimSubHead } from '../components/ClaimSubHead'; function getComponent() { return simpleRender(<ClaimSubHead type={ClaimType.UNI} />, { initialState: mockStore({ dataStoreState: { claims: { claims: { [ClaimType.UNI]: [ { address: fAccounts[0].address, state: ClaimState.UNCLAIMED, amount: '403' as ITxValue } ] }, error: false } } }) }); } describe('ClaimSubHead', () => { test('Render the subHeading', async () => { getComponent(); expect( screen.getByText( new RegExp( translateRaw('UNI_CLAIM_SUBHEAD', { $total: '1' }), 'i' ) ) ).toBeDefined(); }); }); ```
/content/code_sandbox/src/components/ActionsPanel/__tests__/ClaimSubHead.test.tsx
xml
2016-12-04T01:35:27
2024-08-14T21:41:58
MyCrypto
MyCryptoHQ/MyCrypto
1,347
239